Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-27068
Vulnerability from cvelistv5
Published
2020-12-15 16:17
Modified
2024-08-04 16:11
Severity ?
EPSS score ?
Summary
Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel
References
▼ | URL | Tags | |
---|---|---|---|
security@android.com | https://source.android.com/security/bulletin/pixel/2022-06-01 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/pixel/2022-06-01 | Patch, Vendor Advisory |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T16:11:35.394Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Android", vendor: "n/a", versions: [ { status: "affected", version: "Android kernel", }, ], }, ], descriptions: [ { lang: "en", value: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", }, ], problemTypes: [ { descriptions: [ { description: "Information disclosure", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-06-15T13:17:21", orgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", shortName: "google_android", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2020-27068", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Android", version: { version_data: [ { version_value: "Android kernel", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/pixel/2022-06-01", refsource: "MISC", url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", assignerShortName: "google_android", cveId: "CVE-2020-27068", datePublished: "2020-12-15T16:17:26", dateReserved: "2020-10-12T00:00:00", dateUpdated: "2024-08-04T16:11:35.394Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2020-27068\",\"sourceIdentifier\":\"security@android.com\",\"published\":\"2020-12-15T17:15:14.270\",\"lastModified\":\"2024-11-21T05:20:44.920\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel\"},{\"lang\":\"es\",\"value\":\"Producto: AndroidVersiones: Android kernelAndroid ID: A-127973231Referencias: Kernel ascendente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26\"}]}]}],\"references\":[{\"url\":\"https://source.android.com/security/bulletin/pixel/2022-06-01\",\"source\":\"security@android.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/pixel/2022-06-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}", }, }
suse-su-2021:0097-1
Vulnerability from csaf_suse
Published
2021-01-12 18:16
Modified
2021-01-12 18:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#1179663).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-11668: Fixed an out of bounds write to the heap in drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) caused by mishandling invalid descriptors (bsc#1168952).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
The following non-security bugs were fixed:
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: timer: Limit max amount of slave instances (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
- ASoC: sti: fix possible sleep-in-atomic (git-fixes).
- ASoC: wm8904: fix regcache handling (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: fix backtrace on coredump (git-fixes).
- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- ath9k_htc: Discard undersized packets (git-fixes).
- ath9k_htc: Modify byte order for an error message (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).
- Bluetooth: Fix advertising duplicated flags (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#1050242).
- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: mcp251x: add error check when wq alloc failed (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#1066129).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).
- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
- gpio: max77620: Fixup debounce delays (git-fixes).
- gpio: max77620: Use correct unit for debounce times (git-fixes).
- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).
- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).
- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).
- gpiolib: fix up emulated open drain outputs (git-fixes).
- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: Improve Windows Precision Touchpad detection (git-fixes).
- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).
- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (bsc#1111666)
- i40iw: fix null pointer dereference on a null wqe pointer (bsc#1111666)
- i40iw: Report correct firmware version (bsc#1111666)
- IB/cma: Fix ports memory leak in cma_configfs (bsc#1111666)
- IB/hfi1: Call kobject_put() when kobject_init_and_add() fails (bsc#1111666)
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (bsc#1111666)
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (bsc#1111666)
- IB/mlx4: Add and improve logging (bsc#1111666)
- IB/mlx4: Add support for MRA (bsc#1111666)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1111666)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1111666)
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (bsc#1111666)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1111666)
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (bsc#1111666)
- IB/rdmavt: Fix sizeof mismatch (bsc#1111666)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1111666)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- igc: Fix returning wrong statistics (bsc#1118657).
- iio: adc: max1027: Reset the device at probe time (git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio: fix center temperature of bmc150-accel-core (git-fixes).
- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).
- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).
- iio: srf04: fix wrong limitation in distance measuring (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- ipw2x00: Fix -Wcast-function-type (git-fixes).
- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- kABI fix for g2d (git-fixes).
- kABI workaround for dsa/b53 changes (git-fixes).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for net/ipvlan changes (git-fixes).
- kABI workaround for usermodehelper changes (bsc#1179406).
- kABI: ath10k: move a new structure member to the end (git-fixes).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: fix authentication with iwlwifi/mvm (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- matroxfb: avoid -Warray-bounds warning (git-fixes).
- md/raid5: fix oops during stripe resizing (git-fixes).
- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).
- media: cec-funcs.h: add status_req checks (git-fixes).
- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
- media: i2c: ov2659: Fix missing 720p register config (git-fixes).
- media: i2c: ov2659: fix s_stream return value (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).
- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: si470x-i2c: add missed operations in remove (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).
- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- mlxsw: core: Fix memory leak on module removal (bsc#1112374).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- Move upstreamed bt fixes into sorted section
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/tls: Fix kmap usage (bsc#1109837).
- net/tls: missing received data after fast remote close (bsc#1109837).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
- net: aquantia: fix LRO with FCS error (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).
- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).
- net: dsa: b53: Ensure the default VID is untagged (git-fixes).
- net: dsa: b53: Fix default VLAN ID (git-fixes).
- net: dsa: b53: Properly account for VLAN filtering (git-fixes).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).
- net: dsa: qca8k: remove leftover phy accessors (git-fixes).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (git-fixes).
- net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).
- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
- net: macb: add missing barriers when reading descriptors (git-fixes).
- net: macb: fix dropped RX frames due to a race (git-fixes).
- net: macb: fix error format in dev_err() (git-fixes).
- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).
- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
- net: phy: Avoid multiple suspends (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#1104389).
- net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).
- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
- net: stmmac: fix csr_clk can't be zero issue (git-fixes).
- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).
- net: usb: sr9800: fix uninitialized local variable (git-fixes).
- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
- net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#1056787).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nfp: use correct define to return NONE fec (bsc#1109837).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- ocfs2: fix unbalanced locking (bsc#1180506).
- ocfs2: initialize ip_next_orphan (bsc#1179724).
- orinoco: Move context allocation after processing the skb (git-fixes).
- parport: load lowlevel driver if ports not found (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- phy: Revert toggling reset changes (git-fixes).
- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).
- PM: ACPI: Output correct message on target power state (git-fixes).
- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- ppp: remove the PPPIOCDETACH ioctl (git-fixes).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#1050545).
- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (bsc#1050536 bsc#1050545).
- qed: suppress false-positives interrupt error messages on HW init (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
- RDMA/bnxt_re: Fix lifetimes in bnxt_re_task (bsc#1111666)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1111666)
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (bsc#1111666)
- RDMA/cm: Fix checking for allowed duplicate listens (bsc#1111666)
- RDMA/cm: Remove a race freeing timewait_info (bsc#1111666)
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (bsc#1111666)
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (bsc#1111666)
- RDMA/core: Fix race between destroy and release FD object (bsc#1111666)
- RDMA/core: Prevent mixed use of FDs between shared ufiles (bsc#1111666)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1111666)
- RDMA/hns: Set the unsupported wr opcode (bsc#1111666)
- RDMA/ipoib: Fix ABBA deadlock with ipoib_reap_ah() (bsc#1111666)
- RDMA/ipoib: Return void from ipoib_ib_dev_stop() (bsc#1111666)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1111666)
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (bsc#1111666)
- RDMA/mlx4: Initialize ib_spec on the stack (bsc#1111666)
- RDMA/mlx4: Read pkey table length instead of hardcoded value (bsc#1111666)
- RDMA/mlx5: Set GRH fields in query QP on RoCE (bsc#1111666)
- RDMA/mlx5: Verify that QP is created with RQ or SQ (bsc#1111666)
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (bsc#1111666)
- RDMA/qedr: Endianness warnings cleanup (bsc#1111666)
- RDMA/qedr: Fix doorbell setting (bsc#1111666)
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#1050545).
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).
- RDMA/qedr: Fix use of uninitialized field (bsc#1111666)
- RDMA/qedr: SRQ's bug fixes (bsc#1111666)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1111666)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1111666)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1111666)
- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1111666)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1111666)
- RDMA/rxe: Remove useless rxe_init_device_param assignments (bsc#1111666)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1111666)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1111666)
- RDMA/rxe: Set default vendor ID (bsc#1111666)
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (bsc#1111666)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1111666)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1111666)
- reboot: fix overflow parsing reboot cpu number (bsc#1179421).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).
- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).
- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: Fix wrong rvring index computation (git-fixes).
- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
- rtc: 88pm860x: fix possible race condition (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).
- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (git-fixes).
- s390/stp: add locking to sysfs functions (git-fixes).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
- scsi: lpfc: Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
- scsi: lpfc: Use generic power management (bsc#1164780).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: Remove unneeded break statements (bsc#1164780).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: imx: gpc: fix power up sequencing (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: img-spfi: fix potential double release (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: pxa2xx: Add missed security checks (git-fixes).
- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: add missed clk_unprepare (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- splice: only read in as much information as there is pipe buffer space (bsc#1179520).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: add a missing dependency (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).
- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
- staging: rtl8188eu: fix possible null dereference (git-fixes).
- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1103992).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#1103992).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).
- tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#1109837).
- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).
- timer: Fix wheel index calculation on last level (git fixes)
- timer: Prevent base->clk from moving backward (git-fixes)
- tracing: Fix out of bounds write in get_trace_buf (bsc#1179403).
- tty: always relink the port (git-fixes).
- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
- tty: link tty and port before configuring it as console (git-fixes).
- tty: synclink_gt: Adjust indentation in several functions (git-fixes).
- tty: synclinkmp: Adjust indentation in several functions (git-fixes).
- tty:serial:mvebu-uart:fix a wrong return (git-fixes).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc2: Fix IN FIFO allocation (git-fixes).
- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
- usb: fsl: Check memory resource before releasing it (git-fixes).
- usb: gadget: composite: Fix possible double free memory bug (git-fixes).
- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).
- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
- usb: gadget: fix wrong endpoint desc (git-fixes).
- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: ldusb: use unsigned size format specifiers (git-fixes).
- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).
- usb: serial: digi_acceleport: clean up set_termios (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: digi_acceleport: remove in_interrupt() usage.
- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).
- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).
- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: Skip endpoints with 0 maxpacket length (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- usermodehelper: reset umask to default before executing user process (bsc#1179406).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- vt: do not hardcode the mem allocation upper bound (git-fixes).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: da9062: do not ping the hw during stop() (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).
- xfrm: Fix memleak on xfrm state destroy (bsc#1158775).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames
SUSE-2021-97,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-97
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP1 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#1179663).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-11668: Fixed an out of bounds write to the heap in drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) caused by mishandling invalid descriptors (bsc#1168952).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).\n- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).\n- ALSA: ca0106: fix error code handling (git-fixes).\n- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).\n- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).\n- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).\n- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).\n- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).\n- ALSA: timer: Limit max amount of slave instances (git-fixes).\n- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).\n- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).\n- ASoC: sti: fix possible sleep-in-atomic (git-fixes).\n- ASoC: wm8904: fix regcache handling (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: fix backtrace on coredump (git-fixes).\n- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).\n- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- ath9k_htc: Discard undersized packets (git-fixes).\n- ath9k_htc: Modify byte order for an error message (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).\n- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).\n- Bluetooth: Fix advertising duplicated flags (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#1050242).\n- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: mcp251x: add error check when wq alloc failed (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).\n- coredump: fix core_pattern parse error (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#1066129).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).\n- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).\n- gpio: max77620: Fixup debounce delays (git-fixes).\n- gpio: max77620: Use correct unit for debounce times (git-fixes).\n- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).\n- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).\n- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).\n- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).\n- gpiolib: fix up emulated open drain outputs (git-fixes).\n- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).\n- HID: core: Correctly handle ReportSize being zero (git-fixes).\n- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: Improve Windows Precision Touchpad detection (git-fixes).\n- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).\n- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).\n- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).\n- i2c: i801: Fix resume bug (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).\n- i40iw: Fix error handling in i40iw_manage_arp_cache() (bsc#1111666)\n- i40iw: fix null pointer dereference on a null wqe pointer (bsc#1111666)\n- i40iw: Report correct firmware version (bsc#1111666)\n- IB/cma: Fix ports memory leak in cma_configfs (bsc#1111666)\n- IB/hfi1: Call kobject_put() when kobject_init_and_add() fails (bsc#1111666)\n- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (bsc#1111666)\n- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (bsc#1111666)\n- IB/mlx4: Add and improve logging (bsc#1111666)\n- IB/mlx4: Add support for MRA (bsc#1111666)\n- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1111666)\n- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1111666)\n- IB/mlx4: Test return value of calls to ib_get_cached_pkey (bsc#1111666)\n- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1111666)\n- IB/qib: Call kobject_put() when kobject_init_and_add() fails (bsc#1111666)\n- IB/rdmavt: Fix sizeof mismatch (bsc#1111666)\n- IB/srpt: Fix memory leak in srpt_add_one (bsc#1111666)\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- igc: Fix returning wrong statistics (bsc#1118657).\n- iio: adc: max1027: Reset the device at probe time (git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).\n- iio: fix center temperature of bmc150-accel-core (git-fixes).\n- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).\n- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).\n- iio: srf04: fix wrong limitation in distance measuring (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- Input: trackpoint - add new trackpoint variant IDs (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- ipw2x00: Fix -Wcast-function-type (git-fixes).\n- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- kABI fix for g2d (git-fixes).\n- kABI workaround for dsa/b53 changes (git-fixes).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for net/ipvlan changes (git-fixes).\n- kABI workaround for usermodehelper changes (bsc#1179406).\n- kABI: ath10k: move a new structure member to the end (git-fixes).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- kgdb: Fix spurious true from in_dbg_master() (git-fixes).\n- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: fix authentication with iwlwifi/mvm (git-fixes).\n- mac80211: fix use of skb payload instead of header (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- matroxfb: avoid -Warray-bounds warning (git-fixes).\n- md/raid5: fix oops during stripe resizing (git-fixes).\n- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).\n- media: cec-funcs.h: add status_req checks (git-fixes).\n- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).\n- media: i2c: ov2659: Fix missing 720p register config (git-fixes).\n- media: i2c: ov2659: fix s_stream return value (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).\n- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: si470x-i2c: add missed operations in remove (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).\n- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).\n- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mei: protect mei_cl_mtu from null dereference (git-fixes).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- mlxsw: core: Fix memory leak on module removal (bsc#1112374).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- Move upstreamed bt fixes into sorted section\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/tls: Fix kmap usage (bsc#1109837).\n- net/tls: missing received data after fast remote close (bsc#1109837).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).\n- net: aquantia: fix LRO with FCS error (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).\n- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).\n- net: dsa: b53: Ensure the default VID is untagged (git-fixes).\n- net: dsa: b53: Fix default VLAN ID (git-fixes).\n- net: dsa: b53: Properly account for VLAN filtering (git-fixes).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).\n- net: dsa: qca8k: remove leftover phy accessors (git-fixes).\n- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).\n- net: ena: handle bad request id in ena_netdev (git-fixes).\n- net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).\n- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).\n- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).\n- net: macb: add missing barriers when reading descriptors (git-fixes).\n- net: macb: fix dropped RX frames due to a race (git-fixes).\n- net: macb: fix error format in dev_err() (git-fixes).\n- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).\n- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).\n- net: phy: Avoid multiple suspends (git-fixes).\n- net: qed: fix 'maybe uninitialized' warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#1104389).\n- net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).\n- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).\n- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).\n- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).\n- net: stmmac: fix csr_clk can't be zero issue (git-fixes).\n- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).\n- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).\n- net: usb: sr9800: fix uninitialized local variable (git-fixes).\n- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).\n- net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#1056787).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).\n- nfp: use correct define to return NONE fec (bsc#1109837).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- ocfs2: initialize ip_next_orphan (bsc#1179724).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- parport: load lowlevel driver if ports not found (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- phy: Revert toggling reset changes (git-fixes).\n- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).\n- PM: ACPI: Output correct message on target power state (git-fixes).\n- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).\n- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- ppp: remove the PPPIOCDETACH ioctl (git-fixes).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#1050545).\n- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (bsc#1050536 bsc#1050545).\n- qed: suppress false-positives interrupt error messages on HW init (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).\n- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).\n- RDMA/bnxt_re: Fix lifetimes in bnxt_re_task (bsc#1111666)\n- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1111666)\n- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (bsc#1111666)\n- RDMA/cm: Fix checking for allowed duplicate listens (bsc#1111666)\n- RDMA/cm: Remove a race freeing timewait_info (bsc#1111666)\n- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (bsc#1111666)\n- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (bsc#1111666)\n- RDMA/core: Fix race between destroy and release FD object (bsc#1111666)\n- RDMA/core: Prevent mixed use of FDs between shared ufiles (bsc#1111666)\n- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1111666)\n- RDMA/hns: Set the unsupported wr opcode (bsc#1111666)\n- RDMA/ipoib: Fix ABBA deadlock with ipoib_reap_ah() (bsc#1111666)\n- RDMA/ipoib: Return void from ipoib_ib_dev_stop() (bsc#1111666)\n- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1111666)\n- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (bsc#1111666)\n- RDMA/mlx4: Initialize ib_spec on the stack (bsc#1111666)\n- RDMA/mlx4: Read pkey table length instead of hardcoded value (bsc#1111666)\n- RDMA/mlx5: Set GRH fields in query QP on RoCE (bsc#1111666)\n- RDMA/mlx5: Verify that QP is created with RQ or SQ (bsc#1111666)\n- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (bsc#1111666)\n- RDMA/qedr: Endianness warnings cleanup (bsc#1111666)\n- RDMA/qedr: Fix doorbell setting (bsc#1111666)\n- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#1050545).\n- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).\n- RDMA/qedr: Fix use of uninitialized field (bsc#1111666)\n- RDMA/qedr: SRQ's bug fixes (bsc#1111666)\n- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1111666)\n- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1111666)\n- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1111666)\n- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1111666)\n- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1111666)\n- RDMA/rxe: Remove useless rxe_init_device_param assignments (bsc#1111666)\n- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1111666)\n- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1111666)\n- RDMA/rxe: Set default vendor ID (bsc#1111666)\n- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (bsc#1111666)\n- RDMA/rxe: Skip dgid check in loopback mode (bsc#1111666)\n- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1111666)\n- reboot: fix overflow parsing reboot cpu number (bsc#1179421).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).\n- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).\n- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- remoteproc: Fix wrong rvring index computation (git-fixes).\n- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).\n- rtc: 88pm860x: fix possible race condition (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).\n- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).\n- s390/bpf: Fix multiple tail calls (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (git-fixes).\n- s390/stp: add locking to sysfs functions (git-fixes).\n- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).\n- scsi: lpfc: Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).\n- scsi: lpfc: Use generic power management (bsc#1164780).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: Remove unneeded break statements (bsc#1164780).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).\n- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).\n- SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: imx: gpc: fix power up sequencing (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: Fix memory leak on splited transfers (git-fixes).\n- spi: img-spfi: fix potential double release (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: pxa2xx: Add missed security checks (git-fixes).\n- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).\n- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: add missed clk_unprepare (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- splice: only read in as much information as there is pipe buffer space (bsc#1179520).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: add a missing dependency (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).\n- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).\n- staging: rtl8188eu: fix possible null dereference (git-fixes).\n- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).\n- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1103992).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).\n- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#1103992).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).\n- tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#1109837).\n- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).\n- timer: Fix wheel index calculation on last level (git fixes)\n- timer: Prevent base->clk from moving backward (git-fixes)\n- tracing: Fix out of bounds write in get_trace_buf (bsc#1179403).\n- tty: always relink the port (git-fixes).\n- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).\n- tty: link tty and port before configuring it as console (git-fixes).\n- tty: synclink_gt: Adjust indentation in several functions (git-fixes).\n- tty: synclinkmp: Adjust indentation in several functions (git-fixes).\n- tty:serial:mvebu-uart:fix a wrong return (git-fixes).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).\n- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- usb: dwc2: Fix IN FIFO allocation (git-fixes).\n- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).\n- usb: fsl: Check memory resource before releasing it (git-fixes).\n- usb: gadget: composite: Fix possible double free memory bug (git-fixes).\n- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).\n- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).\n- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).\n- usb: gadget: fix wrong endpoint desc (git-fixes).\n- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).\n- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).\n- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).\n- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- usb: ldusb: use unsigned size format specifiers (git-fixes).\n- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).\n- usb: serial: digi_acceleport: clean up set_termios (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: digi_acceleport: remove in_interrupt() usage.\n- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).\n- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).\n- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: kl5kusb105: fix memleak on open (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: serial: option: fix Quectel BG96 matching (git-fixes).\n- usb: Skip endpoints with 0 maxpacket length (git-fixes).\n- usb: UAS: introduce a quirk to set no_write_same (git-fixes).\n- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- usermodehelper: reset umask to default before executing user process (bsc#1179406).\n- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).\n- vt: do not hardcode the mem allocation upper bound (git-fixes).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: da9062: do not ping the hw during stop() (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).\n- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).\n- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).\n- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).\n- xfrm: Fix memleak on xfrm state destroy (bsc#1158775).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-97,SUSE-SLE-Module-Public-Cloud-15-SP1-2021-97", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0097-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0097-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210097-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0097-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008186.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1050242", url: "https://bugzilla.suse.com/1050242", }, { category: "self", summary: "SUSE Bug 1050536", url: "https://bugzilla.suse.com/1050536", }, { category: "self", summary: "SUSE Bug 1050545", url: "https://bugzilla.suse.com/1050545", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1056653", url: "https://bugzilla.suse.com/1056653", }, { category: "self", summary: "SUSE Bug 1056657", url: "https://bugzilla.suse.com/1056657", }, { category: "self", summary: "SUSE Bug 1056787", url: "https://bugzilla.suse.com/1056787", }, { category: "self", summary: "SUSE Bug 1064802", url: "https://bugzilla.suse.com/1064802", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066129", url: "https://bugzilla.suse.com/1066129", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103992", url: "https://bugzilla.suse.com/1103992", }, { category: "self", summary: "SUSE Bug 1104389", url: "https://bugzilla.suse.com/1104389", }, { category: "self", summary: "SUSE Bug 1104393", url: "https://bugzilla.suse.com/1104393", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1110096", url: "https://bugzilla.suse.com/1110096", }, { category: "self", summary: "SUSE Bug 1111666", url: "https://bugzilla.suse.com/1111666", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1118657", url: "https://bugzilla.suse.com/1118657", }, { category: "self", summary: "SUSE Bug 1122971", url: "https://bugzilla.suse.com/1122971", }, { category: "self", summary: "SUSE Bug 1136460", url: "https://bugzilla.suse.com/1136460", }, { category: "self", summary: "SUSE Bug 1136461", url: "https://bugzilla.suse.com/1136461", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1144912", url: "https://bugzilla.suse.com/1144912", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1158775", url: "https://bugzilla.suse.com/1158775", }, { category: "self", summary: "SUSE Bug 1164780", url: "https://bugzilla.suse.com/1164780", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172538", url: "https://bugzilla.suse.com/1172538", }, { category: "self", summary: "SUSE Bug 1172694", url: "https://bugzilla.suse.com/1172694", }, { category: "self", summary: "SUSE Bug 1173834", url: "https://bugzilla.suse.com/1173834", }, { category: "self", summary: "SUSE Bug 1174784", url: "https://bugzilla.suse.com/1174784", }, { category: "self", summary: "SUSE Bug 1174852", url: "https://bugzilla.suse.com/1174852", }, { category: "self", summary: "SUSE Bug 1176558", url: "https://bugzilla.suse.com/1176558", }, { category: "self", summary: "SUSE Bug 1176559", url: "https://bugzilla.suse.com/1176559", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179141", url: "https://bugzilla.suse.com/1179141", }, { category: "self", summary: "SUSE Bug 1179142", url: "https://bugzilla.suse.com/1179142", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179403", url: "https://bugzilla.suse.com/1179403", }, { category: "self", summary: "SUSE Bug 1179406", url: "https://bugzilla.suse.com/1179406", }, { category: "self", summary: "SUSE Bug 1179418", url: "https://bugzilla.suse.com/1179418", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179421", url: "https://bugzilla.suse.com/1179421", }, { category: "self", summary: "SUSE Bug 1179429", url: "https://bugzilla.suse.com/1179429", }, { category: "self", summary: "SUSE Bug 1179444", url: "https://bugzilla.suse.com/1179444", }, { category: "self", summary: "SUSE Bug 1179520", url: "https://bugzilla.suse.com/1179520", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1179724", url: "https://bugzilla.suse.com/1179724", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179810", url: "https://bugzilla.suse.com/1179810", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE CVE CVE-2018-20669 page", url: "https://www.suse.com/security/cve/CVE-2018-20669/", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-15436 page", url: "https://www.suse.com/security/cve/CVE-2020-15436/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-29371 page", url: "https://www.suse.com/security/cve/CVE-2020-29371/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-12T18:16:17Z", generator: { date: "2021-01-12T18:16:17Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0097-1", initial_release_date: "2021-01-12T18:16:17Z", revision_history: [ { date: "2021-01-12T18:16:17Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-8.58.1.noarch", product: { name: "kernel-devel-azure-4.12.14-8.58.1.noarch", product_id: "kernel-devel-azure-4.12.14-8.58.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-8.58.1.noarch", product: { name: "kernel-source-azure-4.12.14-8.58.1.noarch", product_id: "kernel-source-azure-4.12.14-8.58.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.12.14-8.58.1.x86_64", product: { name: "cluster-md-kmp-azure-4.12.14-8.58.1.x86_64", product_id: "cluster-md-kmp-azure-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.12.14-8.58.1.x86_64", product: { name: "dlm-kmp-azure-4.12.14-8.58.1.x86_64", product_id: "dlm-kmp-azure-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.12.14-8.58.1.x86_64", product: { name: "gfs2-kmp-azure-4.12.14-8.58.1.x86_64", product_id: "gfs2-kmp-azure-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.12.14-8.58.1.x86_64", product: { name: "kernel-azure-4.12.14-8.58.1.x86_64", product_id: "kernel-azure-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-8.58.1.x86_64", product: { name: "kernel-azure-base-4.12.14-8.58.1.x86_64", product_id: "kernel-azure-base-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-8.58.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-8.58.1.x86_64", product_id: "kernel-azure-devel-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.12.14-8.58.1.x86_64", product: { name: "kernel-azure-extra-4.12.14-8.58.1.x86_64", product_id: "kernel-azure-extra-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-4.12.14-8.58.1.x86_64", product: { name: "kernel-azure-livepatch-devel-4.12.14-8.58.1.x86_64", product_id: "kernel-azure-livepatch-devel-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-8.58.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-8.58.1.x86_64", product_id: "kernel-syms-azure-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.12.14-8.58.1.x86_64", product: { name: "kselftests-kmp-azure-4.12.14-8.58.1.x86_64", product_id: "kselftests-kmp-azure-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.12.14-8.58.1.x86_64", product: { name: "ocfs2-kmp-azure-4.12.14-8.58.1.x86_64", product_id: "ocfs2-kmp-azure-4.12.14-8.58.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-4.12.14-8.58.1.x86_64", product: { name: "reiserfs-kmp-azure-4.12.14-8.58.1.x86_64", product_id: "reiserfs-kmp-azure-4.12.14-8.58.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", }, product_reference: "kernel-azure-4.12.14-8.58.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-8.58.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-8.58.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-8.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-8.58.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-8.58.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-8.58.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-8.58.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP1", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-8.58.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20669", }, ], notes: [ { category: "general", text: "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20669", url: "https://www.suse.com/security/cve/CVE-2018-20669", }, { category: "external", summary: "SUSE Bug 1122971 for CVE-2018-20669", url: "https://bugzilla.suse.com/1122971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2018-20669", }, { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-15436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15436", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15436", url: "https://www.suse.com/security/cve/CVE-2020-15436", }, { category: "external", summary: "SUSE Bug 1179141 for CVE-2020-15436", url: "https://bugzilla.suse.com/1179141", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "moderate", }, ], title: "CVE-2020-15436", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-29371", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29371", }, ], notes: [ { category: "general", text: "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29371", url: "https://www.suse.com/security/cve/CVE-2020-29371", }, { category: "external", summary: "SUSE Bug 1179429 for CVE-2020-29371", url: "https://bugzilla.suse.com/1179429", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "low", }, ], title: "CVE-2020-29371", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-base-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-azure-devel-4.12.14-8.58.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-devel-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-source-azure-4.12.14-8.58.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP1:kernel-syms-azure-4.12.14-8.58.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:16:17Z", details: "moderate", }, ], title: "CVE-2020-4788", }, ], }
suse-su-2021:0452-1
Vulnerability from csaf_suse
Published
2021-02-12 16:37
Modified
2021-02-12 16:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).
The following non-security bugs were fixed:
- cifs: do not revalidate mountpoint dentries (bsc#1177440).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: ignore revalidate failures in case of process gets signaled (bsc#1177440).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb->lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix pi_state->owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb->lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- IB/hfi1: Clean up hfi1_user_exp_rcv_setup function (bsc#1179878).
- IB/hfi1: Clean up pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Fix the bail out code in pin_vector_pages() function (bsc#1179878).
- IB/hfi1: Move structure definitions from user_exp_rcv.c to user_exp_rcv.h (bsc#1179878).
- IB/hfi1: Name function prototype parameters (bsc#1179878).
- IB/hfi1: Use filedata rather than filepointer (bsc#1179878).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
- Use r3 instead of r13 for l1d fallback flush in do_uaccess_fush (bsc#1181096 ltc#190883).
- video: hyperv_fb: include vmalloc.h (bsc#1175306).
Patchnames
HPE-Helion-OpenStack-8-2021-452,SUSE-2021-452,SUSE-OpenStack-Cloud-8-2021-452,SUSE-OpenStack-Cloud-Crowbar-8-2021-452,SUSE-SLE-HA-12-SP3-2021-452,SUSE-SLE-SAP-12-SP3-2021-452,SUSE-SLE-SERVER-12-SP3-2021-452,SUSE-SLE-SERVER-12-SP3-BCL-2021-452,SUSE-Storage-5-2021-452
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).\n- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2020-25285: Fixed a race condition between hugetlb sysctl handlers in mm/hugetlb.c (bnc#1176485).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).\n- CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation (bnc#1105322).\n\nThe following non-security bugs were fixed:\n\n- cifs: do not revalidate mountpoint dentries (bsc#1177440).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cifs: ignore revalidate failures in case of process gets signaled (bsc#1177440).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- futex: Avoid freeing an active timer (bsc#969755).\n- futex: Avoid violating the 10th rule of futex (bsc#969755).\n- futex: Change locking rules (bsc#969755).\n- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).\n- futex: Drop hb->lock before enqueueing on the rtmutex (bsc#969755).\n- futex: Fix incorrect should_fail_futex() handling (bsc#969755).\n- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).\n- futex: Fix OWNER_DEAD fixup (bsc#969755).\n- futex: Fix pi_state->owner serialization (bsc#969755).\n- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).\n- futex: Futex_unlock_pi() determinism (bsc#969755).\n- futex: Handle early deadlock return correctly (bsc#969755).\n- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).\n- futex: Pull rt_mutex_futex_unlock() out from under hb->lock (bsc#969755).\n- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).\n- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).\n- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).\n- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).\n- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).\n- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- IB/hfi1: Clean up hfi1_user_exp_rcv_setup function (bsc#1179878).\n- IB/hfi1: Clean up pin_vector_pages() function (bsc#1179878).\n- IB/hfi1: Fix the bail out code in pin_vector_pages() function (bsc#1179878).\n- IB/hfi1: Move structure definitions from user_exp_rcv.c to user_exp_rcv.h (bsc#1179878).\n- IB/hfi1: Name function prototype parameters (bsc#1179878).\n- IB/hfi1: Use filedata rather than filepointer (bsc#1179878).\n- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).\n- Use r3 instead of r13 for l1d fallback flush in do_uaccess_fush (bsc#1181096 ltc#190883).\n- video: hyperv_fb: include vmalloc.h (bsc#1175306).\n", title: "Description of the patch", }, { category: "details", text: "HPE-Helion-OpenStack-8-2021-452,SUSE-2021-452,SUSE-OpenStack-Cloud-8-2021-452,SUSE-OpenStack-Cloud-Crowbar-8-2021-452,SUSE-SLE-HA-12-SP3-2021-452,SUSE-SLE-SAP-12-SP3-2021-452,SUSE-SLE-SERVER-12-SP3-2021-452,SUSE-SLE-SERVER-12-SP3-BCL-2021-452,SUSE-Storage-5-2021-452", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0452-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0452-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210452-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0452-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html", }, { category: "self", summary: "SUSE Bug 1105322", url: "https://bugzilla.suse.com/1105322", }, { category: "self", summary: "SUSE Bug 1105323", url: "https://bugzilla.suse.com/1105323", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1173942", url: "https://bugzilla.suse.com/1173942", }, { category: "self", summary: "SUSE Bug 1175306", url: "https://bugzilla.suse.com/1175306", }, { category: "self", summary: "SUSE Bug 1176395", url: "https://bugzilla.suse.com/1176395", }, { category: "self", summary: "SUSE Bug 1176485", url: "https://bugzilla.suse.com/1176485", }, { category: "self", summary: "SUSE Bug 1177440", url: "https://bugzilla.suse.com/1177440", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1178182", url: "https://bugzilla.suse.com/1178182", }, { category: "self", summary: "SUSE Bug 1178272", url: "https://bugzilla.suse.com/1178272", }, { category: "self", summary: "SUSE Bug 1178589", url: "https://bugzilla.suse.com/1178589", }, { category: "self", summary: "SUSE Bug 1178886", url: "https://bugzilla.suse.com/1178886", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179140", url: "https://bugzilla.suse.com/1179140", }, { category: "self", summary: "SUSE Bug 1179141", url: "https://bugzilla.suse.com/1179141", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179508", url: "https://bugzilla.suse.com/1179508", }, { category: "self", summary: "SUSE Bug 1179509", url: "https://bugzilla.suse.com/1179509", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179616", url: "https://bugzilla.suse.com/1179616", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179666", url: "https://bugzilla.suse.com/1179666", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179877", url: "https://bugzilla.suse.com/1179877", }, { category: "self", summary: "SUSE Bug 1179878", url: "https://bugzilla.suse.com/1179878", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179961", url: "https://bugzilla.suse.com/1179961", }, { category: "self", summary: "SUSE Bug 1180008", url: "https://bugzilla.suse.com/1180008", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180028", url: "https://bugzilla.suse.com/1180028", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180030", url: "https://bugzilla.suse.com/1180030", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180032", url: "https://bugzilla.suse.com/1180032", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180562", url: "https://bugzilla.suse.com/1180562", }, { category: "self", summary: "SUSE Bug 1180815", url: "https://bugzilla.suse.com/1180815", }, { category: "self", summary: "SUSE Bug 1181096", url: "https://bugzilla.suse.com/1181096", }, { category: "self", summary: "SUSE Bug 1181158", url: "https://bugzilla.suse.com/1181158", }, { category: "self", summary: "SUSE Bug 1181349", url: "https://bugzilla.suse.com/1181349", }, { category: "self", summary: "SUSE Bug 1181553", url: "https://bugzilla.suse.com/1181553", }, { category: "self", summary: "SUSE Bug 969755", url: "https://bugzilla.suse.com/969755", }, { category: "self", summary: "SUSE CVE CVE-2018-10902 page", url: "https://www.suse.com/security/cve/CVE-2018-10902/", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-15436 page", url: "https://www.suse.com/security/cve/CVE-2020-15436/", }, { category: "self", summary: "SUSE CVE CVE-2020-15437 page", url: "https://www.suse.com/security/cve/CVE-2020-15437/", }, { category: "self", summary: "SUSE CVE CVE-2020-25211 page", url: "https://www.suse.com/security/cve/CVE-2020-25211/", }, { category: "self", summary: "SUSE CVE CVE-2020-25285 page", url: "https://www.suse.com/security/cve/CVE-2020-25285/", }, { category: "self", summary: "SUSE CVE CVE-2020-25669 page", url: "https://www.suse.com/security/cve/CVE-2020-25669/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-27835 page", url: "https://www.suse.com/security/cve/CVE-2020-27835/", }, { category: "self", summary: "SUSE CVE CVE-2020-28915 page", url: "https://www.suse.com/security/cve/CVE-2020-28915/", }, { category: "self", summary: "SUSE CVE CVE-2020-28974 page", url: "https://www.suse.com/security/cve/CVE-2020-28974/", }, { category: "self", summary: "SUSE CVE CVE-2020-29568 page", url: "https://www.suse.com/security/cve/CVE-2020-29568/", }, { category: "self", summary: "SUSE CVE CVE-2020-29569 page", url: "https://www.suse.com/security/cve/CVE-2020-29569/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, { category: "self", summary: "SUSE CVE CVE-2021-3347 page", url: "https://www.suse.com/security/cve/CVE-2021-3347/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-02-12T16:37:02Z", generator: { date: "2021-02-12T16:37:02Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0452-1", initial_release_date: "2021-02-12T16:37:02Z", revision_history: [ { date: "2021-02-12T16:37:02Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.180-94.138.1.aarch64", product: { name: "cluster-md-kmp-default-4.4.180-94.138.1.aarch64", product_id: "cluster-md-kmp-default-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.180-94.138.1.aarch64", product: { name: "dlm-kmp-default-4.4.180-94.138.1.aarch64", product_id: "dlm-kmp-default-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.180-94.138.1.aarch64", product: { name: "gfs2-kmp-default-4.4.180-94.138.1.aarch64", product_id: "gfs2-kmp-default-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.4.180-94.138.1.aarch64", product: { name: "kernel-default-4.4.180-94.138.1.aarch64", product_id: "kernel-default-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.4.180-94.138.1.aarch64", product: { name: "kernel-default-base-4.4.180-94.138.1.aarch64", product_id: "kernel-default-base-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.180-94.138.1.aarch64", product: { name: "kernel-default-devel-4.4.180-94.138.1.aarch64", product_id: "kernel-default-devel-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.180-94.138.1.aarch64", product: { name: "kernel-default-extra-4.4.180-94.138.1.aarch64", product_id: "kernel-default-extra-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.180-94.138.1.aarch64", product: { name: "kernel-default-kgraft-4.4.180-94.138.1.aarch64", product_id: "kernel-default-kgraft-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.180-94.138.1.aarch64", product: { name: "kernel-obs-build-4.4.180-94.138.1.aarch64", product_id: "kernel-obs-build-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.180-94.138.1.aarch64", product: { name: "kernel-obs-qa-4.4.180-94.138.1.aarch64", product_id: "kernel-obs-qa-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.4.180-94.138.1.aarch64", product: { name: "kernel-syms-4.4.180-94.138.1.aarch64", product_id: "kernel-syms-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.180-94.138.1.aarch64", product: { name: "kernel-vanilla-4.4.180-94.138.1.aarch64", product_id: "kernel-vanilla-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.180-94.138.1.aarch64", product: { name: "kernel-vanilla-base-4.4.180-94.138.1.aarch64", product_id: "kernel-vanilla-base-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.180-94.138.1.aarch64", product: { name: "kernel-vanilla-devel-4.4.180-94.138.1.aarch64", product_id: "kernel-vanilla-devel-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.4.180-94.138.1.aarch64", product: { name: "kselftests-kmp-default-4.4.180-94.138.1.aarch64", product_id: "kselftests-kmp-default-4.4.180-94.138.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.180-94.138.1.aarch64", product: { name: "ocfs2-kmp-default-4.4.180-94.138.1.aarch64", product_id: "ocfs2-kmp-default-4.4.180-94.138.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.4.180-94.138.1.noarch", product: { name: "kernel-devel-4.4.180-94.138.1.noarch", product_id: "kernel-devel-4.4.180-94.138.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.4.180-94.138.1.noarch", product: { name: "kernel-macros-4.4.180-94.138.1.noarch", product_id: "kernel-macros-4.4.180-94.138.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.4.180-94.138.1.noarch", product: { name: "kernel-source-4.4.180-94.138.1.noarch", product_id: "kernel-source-4.4.180-94.138.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.4.180-94.138.1.noarch", product: { name: "kernel-docs-4.4.180-94.138.1.noarch", product_id: "kernel-docs-4.4.180-94.138.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.4.180-94.138.1.noarch", product: { name: "kernel-docs-html-4.4.180-94.138.1.noarch", product_id: "kernel-docs-html-4.4.180-94.138.1.noarch", }, }, { category: "product_version", name: "kernel-docs-pdf-4.4.180-94.138.1.noarch", product: { name: "kernel-docs-pdf-4.4.180-94.138.1.noarch", product_id: "kernel-docs-pdf-4.4.180-94.138.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.4.180-94.138.1.noarch", product: { name: "kernel-source-vanilla-4.4.180-94.138.1.noarch", product_id: "kernel-source-vanilla-4.4.180-94.138.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.4.180-94.138.1.ppc64le", product: { name: "cluster-md-kmp-debug-4.4.180-94.138.1.ppc64le", product_id: "cluster-md-kmp-debug-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", product: { name: "cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", product_id: "cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.180-94.138.1.ppc64le", product: { name: "dlm-kmp-debug-4.4.180-94.138.1.ppc64le", product_id: "dlm-kmp-debug-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.180-94.138.1.ppc64le", product: { name: "dlm-kmp-default-4.4.180-94.138.1.ppc64le", product_id: "dlm-kmp-default-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.180-94.138.1.ppc64le", product: { name: "gfs2-kmp-debug-4.4.180-94.138.1.ppc64le", product_id: "gfs2-kmp-debug-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.180-94.138.1.ppc64le", product: { name: "gfs2-kmp-default-4.4.180-94.138.1.ppc64le", product_id: "gfs2-kmp-default-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.4.180-94.138.1.ppc64le", product: { name: "kernel-debug-4.4.180-94.138.1.ppc64le", product_id: "kernel-debug-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.4.180-94.138.1.ppc64le", product: { name: "kernel-debug-base-4.4.180-94.138.1.ppc64le", product_id: "kernel-debug-base-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.180-94.138.1.ppc64le", product: { name: "kernel-debug-devel-4.4.180-94.138.1.ppc64le", product_id: "kernel-debug-devel-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.180-94.138.1.ppc64le", product: { name: "kernel-debug-extra-4.4.180-94.138.1.ppc64le", product_id: "kernel-debug-extra-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.180-94.138.1.ppc64le", product: { name: "kernel-debug-kgraft-4.4.180-94.138.1.ppc64le", product_id: "kernel-debug-kgraft-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.4.180-94.138.1.ppc64le", product: { name: "kernel-default-4.4.180-94.138.1.ppc64le", product_id: "kernel-default-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.4.180-94.138.1.ppc64le", product: { name: "kernel-default-base-4.4.180-94.138.1.ppc64le", product_id: "kernel-default-base-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.4.180-94.138.1.ppc64le", product: { name: "kernel-default-devel-4.4.180-94.138.1.ppc64le", product_id: "kernel-default-devel-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.4.180-94.138.1.ppc64le", product: { name: "kernel-default-extra-4.4.180-94.138.1.ppc64le", product_id: "kernel-default-extra-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.180-94.138.1.ppc64le", product: { name: "kernel-default-kgraft-4.4.180-94.138.1.ppc64le", product_id: "kernel-default-kgraft-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.4.180-94.138.1.ppc64le", product: { name: "kernel-obs-build-4.4.180-94.138.1.ppc64le", product_id: "kernel-obs-build-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.180-94.138.1.ppc64le", product: { name: "kernel-obs-qa-4.4.180-94.138.1.ppc64le", product_id: "kernel-obs-qa-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.4.180-94.138.1.ppc64le", product: { name: "kernel-syms-4.4.180-94.138.1.ppc64le", product_id: "kernel-syms-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.4.180-94.138.1.ppc64le", product: { name: "kernel-vanilla-4.4.180-94.138.1.ppc64le", product_id: "kernel-vanilla-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.180-94.138.1.ppc64le", product: { name: "kernel-vanilla-base-4.4.180-94.138.1.ppc64le", product_id: "kernel-vanilla-base-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.180-94.138.1.ppc64le", product: { name: "kernel-vanilla-devel-4.4.180-94.138.1.ppc64le", product_id: "kernel-vanilla-devel-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", product: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", product_id: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-debug-4.4.180-94.138.1.ppc64le", product: { name: "kselftests-kmp-debug-4.4.180-94.138.1.ppc64le", product_id: "kselftests-kmp-debug-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.4.180-94.138.1.ppc64le", product: { name: "kselftests-kmp-default-4.4.180-94.138.1.ppc64le", product_id: "kselftests-kmp-default-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.180-94.138.1.ppc64le", product: { name: "ocfs2-kmp-debug-4.4.180-94.138.1.ppc64le", product_id: "ocfs2-kmp-debug-4.4.180-94.138.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", product: { name: "ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", product_id: "ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.180-94.138.1.s390x", product: { name: "cluster-md-kmp-default-4.4.180-94.138.1.s390x", product_id: "cluster-md-kmp-default-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.180-94.138.1.s390x", product: { name: "dlm-kmp-default-4.4.180-94.138.1.s390x", product_id: "dlm-kmp-default-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.180-94.138.1.s390x", product: { name: "gfs2-kmp-default-4.4.180-94.138.1.s390x", product_id: "gfs2-kmp-default-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.4.180-94.138.1.s390x", product: { name: "kernel-default-4.4.180-94.138.1.s390x", product_id: "kernel-default-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.4.180-94.138.1.s390x", product: { name: "kernel-default-base-4.4.180-94.138.1.s390x", product_id: "kernel-default-base-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.4.180-94.138.1.s390x", product: { name: "kernel-default-devel-4.4.180-94.138.1.s390x", product_id: "kernel-default-devel-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.4.180-94.138.1.s390x", product: { name: "kernel-default-extra-4.4.180-94.138.1.s390x", product_id: "kernel-default-extra-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.180-94.138.1.s390x", product: { name: "kernel-default-kgraft-4.4.180-94.138.1.s390x", product_id: "kernel-default-kgraft-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.4.180-94.138.1.s390x", product: { name: "kernel-default-man-4.4.180-94.138.1.s390x", product_id: "kernel-default-man-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.4.180-94.138.1.s390x", product: { name: "kernel-obs-build-4.4.180-94.138.1.s390x", product_id: "kernel-obs-build-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.180-94.138.1.s390x", product: { name: "kernel-obs-qa-4.4.180-94.138.1.s390x", product_id: "kernel-obs-qa-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.4.180-94.138.1.s390x", product: { name: "kernel-syms-4.4.180-94.138.1.s390x", product_id: "kernel-syms-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.4.180-94.138.1.s390x", product: { name: "kernel-vanilla-4.4.180-94.138.1.s390x", product_id: "kernel-vanilla-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.180-94.138.1.s390x", product: { name: "kernel-vanilla-base-4.4.180-94.138.1.s390x", product_id: "kernel-vanilla-base-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.180-94.138.1.s390x", product: { name: "kernel-vanilla-devel-4.4.180-94.138.1.s390x", product_id: "kernel-vanilla-devel-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.4.180-94.138.1.s390x", product: { name: "kernel-zfcpdump-4.4.180-94.138.1.s390x", product_id: "kernel-zfcpdump-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.4.180-94.138.1.s390x", product: { name: "kselftests-kmp-default-4.4.180-94.138.1.s390x", product_id: "kselftests-kmp-default-4.4.180-94.138.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.180-94.138.1.s390x", product: { name: "ocfs2-kmp-default-4.4.180-94.138.1.s390x", product_id: "ocfs2-kmp-default-4.4.180-94.138.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-4.4.180-94.138.1.x86_64", product: { name: "kernel-default-4.4.180-94.138.1.x86_64", product_id: "kernel-default-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.4.180-94.138.1.x86_64", product: { name: "kernel-default-base-4.4.180-94.138.1.x86_64", product_id: "kernel-default-base-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.180-94.138.1.x86_64", product: { name: "kernel-default-devel-4.4.180-94.138.1.x86_64", product_id: "kernel-default-devel-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", product: { name: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", product_id: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.4.180-94.138.1.x86_64", product: { name: "kernel-syms-4.4.180-94.138.1.x86_64", product_id: "kernel-syms-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", product: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", product_id: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-debug-4.4.180-94.138.1.x86_64", product: { name: "cluster-md-kmp-debug-4.4.180-94.138.1.x86_64", product_id: "cluster-md-kmp-debug-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.180-94.138.1.x86_64", product: { name: "cluster-md-kmp-default-4.4.180-94.138.1.x86_64", product_id: "cluster-md-kmp-default-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.180-94.138.1.x86_64", product: { name: "dlm-kmp-debug-4.4.180-94.138.1.x86_64", product_id: "dlm-kmp-debug-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.180-94.138.1.x86_64", product: { name: "dlm-kmp-default-4.4.180-94.138.1.x86_64", product_id: "dlm-kmp-default-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.180-94.138.1.x86_64", product: { name: "gfs2-kmp-debug-4.4.180-94.138.1.x86_64", product_id: "gfs2-kmp-debug-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.180-94.138.1.x86_64", product: { name: "gfs2-kmp-default-4.4.180-94.138.1.x86_64", product_id: "gfs2-kmp-default-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.4.180-94.138.1.x86_64", product: { name: "kernel-debug-4.4.180-94.138.1.x86_64", product_id: "kernel-debug-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.4.180-94.138.1.x86_64", product: { name: "kernel-debug-base-4.4.180-94.138.1.x86_64", product_id: "kernel-debug-base-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.180-94.138.1.x86_64", product: { name: "kernel-debug-devel-4.4.180-94.138.1.x86_64", product_id: "kernel-debug-devel-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.180-94.138.1.x86_64", product: { name: "kernel-debug-extra-4.4.180-94.138.1.x86_64", product_id: "kernel-debug-extra-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.180-94.138.1.x86_64", product: { name: "kernel-debug-kgraft-4.4.180-94.138.1.x86_64", product_id: "kernel-debug-kgraft-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.180-94.138.1.x86_64", product: { name: "kernel-default-extra-4.4.180-94.138.1.x86_64", product_id: "kernel-default-extra-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.180-94.138.1.x86_64", product: { name: "kernel-obs-build-4.4.180-94.138.1.x86_64", product_id: "kernel-obs-build-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.180-94.138.1.x86_64", product: { name: "kernel-obs-qa-4.4.180-94.138.1.x86_64", product_id: "kernel-obs-qa-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.180-94.138.1.x86_64", product: { name: "kernel-vanilla-4.4.180-94.138.1.x86_64", product_id: "kernel-vanilla-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.180-94.138.1.x86_64", product: { name: "kernel-vanilla-base-4.4.180-94.138.1.x86_64", product_id: "kernel-vanilla-base-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.180-94.138.1.x86_64", product: { name: "kernel-vanilla-devel-4.4.180-94.138.1.x86_64", product_id: "kernel-vanilla-devel-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-debug-4.4.180-94.138.1.x86_64", product: { name: "kselftests-kmp-debug-4.4.180-94.138.1.x86_64", product_id: "kselftests-kmp-debug-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.4.180-94.138.1.x86_64", product: { name: "kselftests-kmp-default-4.4.180-94.138.1.x86_64", product_id: "kselftests-kmp-default-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.180-94.138.1.x86_64", product: { name: "ocfs2-kmp-debug-4.4.180-94.138.1.x86_64", product_id: "ocfs2-kmp-debug-4.4.180-94.138.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.180-94.138.1.x86_64", product: { name: "ocfs2-kmp-default-4.4.180-94.138.1.x86_64", product_id: "ocfs2-kmp-default-4.4.180-94.138.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "HPE Helion OpenStack 8", product: { name: "HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8", product_identification_helper: { cpe: "cpe:/o:suse:hpe-helion-openstack:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud 8", product: { name: "SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:8", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 8", product: { name: "SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:8", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP3", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp3", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP3-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp3", }, }, }, { category: "product_name", name: "SUSE Enterprise Storage 5", product: { name: "SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5", product_identification_helper: { cpe: "cpe:/o:suse:ses:5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.138.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.138.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.138.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.138.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.138.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.138.1.noarch as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", }, product_reference: "kernel-source-4.4.180-94.138.1.noarch", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.138.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8", product_id: "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", relates_to_product_reference: "HPE Helion OpenStack 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.138.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.138.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.138.1.noarch as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", }, product_reference: "kernel-source-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8", product_id: "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.138.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.138.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.138.1.noarch as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", }, product_reference: "kernel-source-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8", product_id: "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 8", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", }, product_reference: "cluster-md-kmp-default-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", }, product_reference: "dlm-kmp-default-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", }, product_reference: "dlm-kmp-default-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", }, product_reference: "dlm-kmp-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", }, product_reference: "gfs2-kmp-default-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", }, product_reference: "gfs2-kmp-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", }, product_reference: "ocfs2-kmp-default-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-default-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-default-base-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", }, product_reference: "kernel-source-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-syms-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP3", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", }, product_reference: "kernel-default-4.4.180-94.138.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-default-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", }, product_reference: "kernel-default-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-default-base-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", }, product_reference: "kernel-default-base-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", }, product_reference: "kernel-default-man-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", }, product_reference: "kernel-source-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", }, product_reference: "kernel-syms-4.4.180-94.138.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", }, product_reference: "kernel-syms-4.4.180-94.138.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", }, product_reference: "kernel-syms-4.4.180-94.138.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.138.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", }, product_reference: "kernel-source-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL", product_id: "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP3-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", }, product_reference: "kernel-default-4.4.180-94.138.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.180-94.138.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.180-94.138.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-base-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.180-94.138.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-devel-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.4.180-94.138.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-default-kgraft-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.180-94.138.1.noarch as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", }, product_reference: "kernel-devel-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.180-94.138.1.noarch as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", }, product_reference: "kernel-macros-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.180-94.138.1.noarch as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", }, product_reference: "kernel-source-4.4.180-94.138.1.noarch", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.aarch64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", }, product_reference: "kernel-syms-4.4.180-94.138.1.aarch64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.180-94.138.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", }, product_reference: "kernel-syms-4.4.180-94.138.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64 as component of SUSE Enterprise Storage 5", product_id: "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", relates_to_product_reference: "SUSE Enterprise Storage 5", }, ], }, vulnerabilities: [ { cve: "CVE-2018-10902", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-10902", }, ], notes: [ { category: "general", text: "It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-10902", url: "https://www.suse.com/security/cve/CVE-2018-10902", }, { category: "external", summary: "SUSE Bug 1105322 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105322", }, { category: "external", summary: "SUSE Bug 1105323 for CVE-2018-10902", url: "https://bugzilla.suse.com/1105323", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2018-10902", }, { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-15436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15436", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15436", url: "https://www.suse.com/security/cve/CVE-2020-15436", }, { category: "external", summary: "SUSE Bug 1179141 for CVE-2020-15436", url: "https://bugzilla.suse.com/1179141", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-15436", }, { cve: "CVE-2020-15437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15437", }, ], notes: [ { category: "general", text: "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15437", url: "https://www.suse.com/security/cve/CVE-2020-15437", }, { category: "external", summary: "SUSE Bug 1179140 for CVE-2020-15437", url: "https://bugzilla.suse.com/1179140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-15437", }, { cve: "CVE-2020-25211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25211", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25211", url: "https://www.suse.com/security/cve/CVE-2020-25211", }, { category: "external", summary: "SUSE Bug 1176395 for CVE-2020-25211", url: "https://bugzilla.suse.com/1176395", }, { category: "external", summary: "SUSE Bug 1192356 for CVE-2020-25211", url: "https://bugzilla.suse.com/1192356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-25211", }, { cve: "CVE-2020-25285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25285", }, ], notes: [ { category: "general", text: "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25285", url: "https://www.suse.com/security/cve/CVE-2020-25285", }, { category: "external", summary: "SUSE Bug 1176485 for CVE-2020-25285", url: "https://bugzilla.suse.com/1176485", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-25285", }, { cve: "CVE-2020-25669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25669", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25669", url: "https://www.suse.com/security/cve/CVE-2020-25669", }, { category: "external", summary: "SUSE Bug 1178182 for CVE-2020-25669", url: "https://bugzilla.suse.com/1178182", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-25669", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-27835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27835", }, ], notes: [ { category: "general", text: "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27835", url: "https://www.suse.com/security/cve/CVE-2020-27835", }, { category: "external", summary: "SUSE Bug 1179878 for CVE-2020-27835", url: "https://bugzilla.suse.com/1179878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-27835", }, { cve: "CVE-2020-28915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28915", }, ], notes: [ { category: "general", text: "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28915", url: "https://www.suse.com/security/cve/CVE-2020-28915", }, { category: "external", summary: "SUSE Bug 1178886 for CVE-2020-28915", url: "https://bugzilla.suse.com/1178886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-28915", }, { cve: "CVE-2020-28974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28974", }, ], notes: [ { category: "general", text: "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28974", url: "https://www.suse.com/security/cve/CVE-2020-28974", }, { category: "external", summary: "SUSE Bug 1178589 for CVE-2020-28974", url: "https://bugzilla.suse.com/1178589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-28974", }, { cve: "CVE-2020-29568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29568", }, ], notes: [ { category: "general", text: "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29568", url: "https://www.suse.com/security/cve/CVE-2020-29568", }, { category: "external", summary: "SUSE Bug 1179508 for CVE-2020-29568", url: "https://bugzilla.suse.com/1179508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-29568", }, { cve: "CVE-2020-29569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29569", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29569", url: "https://www.suse.com/security/cve/CVE-2020-29569", }, { category: "external", summary: "SUSE Bug 1179509 for CVE-2020-29569", url: "https://bugzilla.suse.com/1179509", }, { category: "external", summary: "SUSE Bug 1180008 for CVE-2020-29569", url: "https://bugzilla.suse.com/1180008", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-29569", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "moderate", }, ], title: "CVE-2020-4788", }, { cve: "CVE-2021-3347", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3347", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", title: "CVE description", }, ], product_status: { recommended: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3347", url: "https://www.suse.com/security/cve/CVE-2021-3347", }, { category: "external", summary: "SUSE Bug 1181349 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181349", }, { category: "external", summary: "SUSE Bug 1181553 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181553", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2021-3347", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "HPE Helion OpenStack 8:kernel-default-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-source-4.4.180-94.138.1.noarch", "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.138.1.x86_64", "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-source-4.4.180-94.138.1.noarch", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Enterprise Storage 5:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Enterprise Storage 5:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.aarch64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.s390x", "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.138.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.138.1.noarch", "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.138.1.x86_64", "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_138-default-1-4.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-12T16:37:02Z", details: "important", }, ], title: "CVE-2021-3347", }, ], }
suse-su-2021:14630-1
Vulnerability from csaf_suse
Published
2021-02-16 15:31
Modified
2021-02-16 15:31
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).
- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).
- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user's keyrings (bsc#1174993).
- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).
- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).
- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).
- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).
The following non-security bugs were fixed:
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- cifs: bugfix for unreclaimed writeback pages in cifs_writev_requeue() (bsc#1177906).
- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).
- net/x25: fix a race in x25_bind() (bsc#1178590).
- net/x25: prevent a couple of overflows (bsc#1178590).
- tty: fix memleak in alloc_pid (bsc#1179745).
- xfs: mark all internal workqueues as freezable (bsc#1181166).
Patchnames
slessp4-kernel-source-14630,slexsp3-kernel-source-14630
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).\n- CVE-2020-14390: Fixed an out-of-bounds memory write leading to memory corruption or a denial of service when changing screen size (bnc#1176235).\n- CVE-2020-25284: Fixed an incomplete permission checking for access to rbd devices, which could have been leveraged by local attackers to map or unmap rbd block devices (bsc#1176482).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n- CVE-2020-14353: Fixed an issue where keys - for keyctl prevent creating a different user's keyrings (bsc#1174993).\n- CVE-2020-14381: Fixed requeue paths such that filp was valid when dropping the references (bsc#1176011).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).\n- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).\n- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-0431: Fixed an out of bounds write due to a missing bounds check (bsc#1176722).\n- CVE-2020-0404: Fixed a linked list corruption due to an unusual root cause (bsc#1176423).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).\n- CVE-2020-25656: Fixed a concurrency use-after-free in vt_do_kdgkb_ioctl (bnc#1177766).\n- CVE-2020-25643: Fixed a memory corruption and a read overflow which could have caused by improper input validation in the ppp_cp_parse_cr function (bsc#1177206).\n- CVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n\nThe following non-security bugs were fixed:\n\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- cifs: bugfix for unreclaimed writeback pages in cifs_writev_requeue() (bsc#1177906).\n- mm, vmstat: reduce zone->lock holding time by /proc/pagetypeinfo (bsc#1175691).\n- net/x25: fix a race in x25_bind() (bsc#1178590).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- tty: fix memleak in alloc_pid (bsc#1179745).\n- xfs: mark all internal workqueues as freezable (bsc#1181166).\n", title: "Description of the patch", }, { category: "details", text: "slessp4-kernel-source-14630,slexsp3-kernel-source-14630", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14630-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:14630-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-202114630-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:14630-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008335.html", }, { category: "self", summary: "SUSE Bug 1152107", url: "https://bugzilla.suse.com/1152107", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1173659", url: "https://bugzilla.suse.com/1173659", }, { category: "self", summary: "SUSE Bug 1173942", url: "https://bugzilla.suse.com/1173942", }, { category: "self", summary: "SUSE Bug 1174205", url: "https://bugzilla.suse.com/1174205", }, { category: "self", summary: "SUSE Bug 1174247", url: "https://bugzilla.suse.com/1174247", }, { category: "self", summary: "SUSE Bug 1174993", url: "https://bugzilla.suse.com/1174993", }, { category: "self", summary: "SUSE Bug 1175691", url: "https://bugzilla.suse.com/1175691", }, { category: "self", summary: "SUSE Bug 1176011", url: "https://bugzilla.suse.com/1176011", }, { category: "self", summary: "SUSE Bug 1176012", url: "https://bugzilla.suse.com/1176012", }, { category: "self", summary: "SUSE Bug 1176235", url: "https://bugzilla.suse.com/1176235", }, { category: "self", summary: "SUSE Bug 1176253", url: "https://bugzilla.suse.com/1176253", }, { category: "self", summary: "SUSE Bug 1176278", url: "https://bugzilla.suse.com/1176278", }, { category: "self", summary: "SUSE Bug 1176395", url: "https://bugzilla.suse.com/1176395", }, { category: "self", summary: "SUSE Bug 1176423", url: "https://bugzilla.suse.com/1176423", }, { category: "self", summary: "SUSE Bug 1176482", url: "https://bugzilla.suse.com/1176482", }, { category: "self", summary: "SUSE Bug 1176485", url: "https://bugzilla.suse.com/1176485", }, { category: "self", summary: "SUSE Bug 1176722", url: "https://bugzilla.suse.com/1176722", }, { category: "self", summary: "SUSE Bug 1176896", url: "https://bugzilla.suse.com/1176896", }, { category: "self", summary: "SUSE Bug 1177206", url: "https://bugzilla.suse.com/1177206", }, { category: "self", summary: "SUSE Bug 1177226", url: "https://bugzilla.suse.com/1177226", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1177766", url: "https://bugzilla.suse.com/1177766", }, { category: "self", summary: "SUSE Bug 1177906", url: "https://bugzilla.suse.com/1177906", }, { category: "self", summary: "SUSE Bug 1178123", url: "https://bugzilla.suse.com/1178123", }, { category: "self", summary: "SUSE Bug 1178182", url: "https://bugzilla.suse.com/1178182", }, { category: "self", summary: "SUSE Bug 1178589", url: "https://bugzilla.suse.com/1178589", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178622", url: "https://bugzilla.suse.com/1178622", }, { category: "self", summary: "SUSE Bug 1178886", url: "https://bugzilla.suse.com/1178886", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179140", url: "https://bugzilla.suse.com/1179140", }, { category: "self", summary: "SUSE Bug 1179141", url: "https://bugzilla.suse.com/1179141", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179616", url: "https://bugzilla.suse.com/1179616", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179877", url: "https://bugzilla.suse.com/1179877", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180030", url: "https://bugzilla.suse.com/1180030", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180562", url: "https://bugzilla.suse.com/1180562", }, { category: "self", summary: "SUSE Bug 1181158", url: "https://bugzilla.suse.com/1181158", }, { category: "self", summary: "SUSE Bug 1181166", url: "https://bugzilla.suse.com/1181166", }, { category: "self", summary: "SUSE Bug 1181349", url: "https://bugzilla.suse.com/1181349", }, { category: "self", summary: "SUSE Bug 1181553", url: "https://bugzilla.suse.com/1181553", }, { category: "self", summary: "SUSE CVE CVE-2019-16746 page", url: "https://www.suse.com/security/cve/CVE-2019-16746/", }, { category: "self", summary: "SUSE CVE CVE-2020-0404 page", url: "https://www.suse.com/security/cve/CVE-2020-0404/", }, { category: "self", summary: "SUSE CVE CVE-2020-0431 page", url: "https://www.suse.com/security/cve/CVE-2020-0431/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-14331 page", url: "https://www.suse.com/security/cve/CVE-2020-14331/", }, { category: "self", summary: "SUSE CVE CVE-2020-14353 page", url: "https://www.suse.com/security/cve/CVE-2020-14353/", }, { category: "self", summary: "SUSE CVE CVE-2020-14381 page", url: "https://www.suse.com/security/cve/CVE-2020-14381/", }, { category: "self", summary: "SUSE CVE CVE-2020-14390 page", url: "https://www.suse.com/security/cve/CVE-2020-14390/", }, { category: "self", summary: "SUSE CVE CVE-2020-15436 page", url: "https://www.suse.com/security/cve/CVE-2020-15436/", }, { category: "self", summary: "SUSE CVE CVE-2020-15437 page", url: "https://www.suse.com/security/cve/CVE-2020-15437/", }, { category: "self", summary: "SUSE CVE CVE-2020-25211 page", url: "https://www.suse.com/security/cve/CVE-2020-25211/", }, { category: "self", summary: "SUSE CVE CVE-2020-25284 page", url: "https://www.suse.com/security/cve/CVE-2020-25284/", }, { category: "self", summary: "SUSE CVE CVE-2020-25285 page", url: "https://www.suse.com/security/cve/CVE-2020-25285/", }, { category: "self", summary: "SUSE CVE CVE-2020-25643 page", url: "https://www.suse.com/security/cve/CVE-2020-25643/", }, { category: "self", summary: "SUSE CVE CVE-2020-25656 page", url: "https://www.suse.com/security/cve/CVE-2020-25656/", }, { category: "self", summary: "SUSE CVE CVE-2020-25668 page", url: "https://www.suse.com/security/cve/CVE-2020-25668/", }, { category: "self", summary: "SUSE CVE CVE-2020-25669 page", url: "https://www.suse.com/security/cve/CVE-2020-25669/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-28915 page", url: "https://www.suse.com/security/cve/CVE-2020-28915/", }, { category: "self", summary: "SUSE CVE CVE-2020-28974 page", url: "https://www.suse.com/security/cve/CVE-2020-28974/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, { category: "self", summary: "SUSE CVE CVE-2021-3347 page", url: "https://www.suse.com/security/cve/CVE-2021-3347/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-02-16T15:31:37Z", generator: { date: "2021-02-16T15:31:37Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:14630-1", initial_release_date: "2021-02-16T15:31:37Z", revision_history: [ { date: "2021-02-16T15:31:37Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-default-3.0.101-108.120.1.i586", product: { name: "kernel-default-3.0.101-108.120.1.i586", product_id: "kernel-default-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.120.1.i586", product: { name: "kernel-default-base-3.0.101-108.120.1.i586", product_id: "kernel-default-base-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.120.1.i586", product: { name: "kernel-default-devel-3.0.101-108.120.1.i586", product_id: "kernel-default-devel-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-108.120.1.i586", product: { name: "kernel-ec2-3.0.101-108.120.1.i586", product_id: "kernel-ec2-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-108.120.1.i586", product: { name: "kernel-ec2-base-3.0.101-108.120.1.i586", product_id: "kernel-ec2-base-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-108.120.1.i586", product: { name: "kernel-ec2-devel-3.0.101-108.120.1.i586", product_id: "kernel-ec2-devel-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-pae-3.0.101-108.120.1.i586", product: { name: "kernel-pae-3.0.101-108.120.1.i586", product_id: "kernel-pae-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-pae-base-3.0.101-108.120.1.i586", product: { name: "kernel-pae-base-3.0.101-108.120.1.i586", product_id: "kernel-pae-base-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-pae-devel-3.0.101-108.120.1.i586", product: { name: "kernel-pae-devel-3.0.101-108.120.1.i586", product_id: "kernel-pae-devel-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.120.1.i586", product: { name: "kernel-source-3.0.101-108.120.1.i586", product_id: "kernel-source-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.120.1.i586", product: { name: "kernel-syms-3.0.101-108.120.1.i586", product_id: "kernel-syms-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.120.1.i586", product: { name: "kernel-trace-3.0.101-108.120.1.i586", product_id: "kernel-trace-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.120.1.i586", product: { name: "kernel-trace-base-3.0.101-108.120.1.i586", product_id: "kernel-trace-base-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.120.1.i586", product: { name: "kernel-trace-devel-3.0.101-108.120.1.i586", product_id: "kernel-trace-devel-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-xen-3.0.101-108.120.1.i586", product: { name: "kernel-xen-3.0.101-108.120.1.i586", product_id: "kernel-xen-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-108.120.1.i586", product: { name: "kernel-xen-base-3.0.101-108.120.1.i586", product_id: "kernel-xen-base-3.0.101-108.120.1.i586", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-108.120.1.i586", product: { name: "kernel-xen-devel-3.0.101-108.120.1.i586", product_id: "kernel-xen-devel-3.0.101-108.120.1.i586", }, }, ], category: "architecture", name: "i586", }, { branches: [ { category: "product_version", name: "kernel-bigmem-3.0.101-108.120.1.ppc64", product: { name: "kernel-bigmem-3.0.101-108.120.1.ppc64", product_id: "kernel-bigmem-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-bigmem-base-3.0.101-108.120.1.ppc64", product: { name: "kernel-bigmem-base-3.0.101-108.120.1.ppc64", product_id: "kernel-bigmem-base-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-bigmem-devel-3.0.101-108.120.1.ppc64", product: { name: "kernel-bigmem-devel-3.0.101-108.120.1.ppc64", product_id: "kernel-bigmem-devel-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-default-3.0.101-108.120.1.ppc64", product: { name: "kernel-default-3.0.101-108.120.1.ppc64", product_id: "kernel-default-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.120.1.ppc64", product: { name: "kernel-default-base-3.0.101-108.120.1.ppc64", product_id: "kernel-default-base-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.120.1.ppc64", product: { name: "kernel-default-devel-3.0.101-108.120.1.ppc64", product_id: "kernel-default-devel-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-3.0.101-108.120.1.ppc64", product: { name: "kernel-ppc64-3.0.101-108.120.1.ppc64", product_id: "kernel-ppc64-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-base-3.0.101-108.120.1.ppc64", product: { name: "kernel-ppc64-base-3.0.101-108.120.1.ppc64", product_id: "kernel-ppc64-base-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-ppc64-devel-3.0.101-108.120.1.ppc64", product: { name: "kernel-ppc64-devel-3.0.101-108.120.1.ppc64", product_id: "kernel-ppc64-devel-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.120.1.ppc64", product: { name: "kernel-source-3.0.101-108.120.1.ppc64", product_id: "kernel-source-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.120.1.ppc64", product: { name: "kernel-syms-3.0.101-108.120.1.ppc64", product_id: "kernel-syms-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.120.1.ppc64", product: { name: "kernel-trace-3.0.101-108.120.1.ppc64", product_id: "kernel-trace-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.120.1.ppc64", product: { name: "kernel-trace-base-3.0.101-108.120.1.ppc64", product_id: "kernel-trace-base-3.0.101-108.120.1.ppc64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.120.1.ppc64", product: { name: "kernel-trace-devel-3.0.101-108.120.1.ppc64", product_id: "kernel-trace-devel-3.0.101-108.120.1.ppc64", }, }, ], category: "architecture", name: "ppc64", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-108.120.1.s390x", product: { name: "kernel-default-3.0.101-108.120.1.s390x", product_id: "kernel-default-3.0.101-108.120.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.120.1.s390x", product: { name: "kernel-default-base-3.0.101-108.120.1.s390x", product_id: "kernel-default-base-3.0.101-108.120.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.120.1.s390x", product: { name: "kernel-default-devel-3.0.101-108.120.1.s390x", product_id: "kernel-default-devel-3.0.101-108.120.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-3.0.101-108.120.1.s390x", product: { name: "kernel-default-man-3.0.101-108.120.1.s390x", product_id: "kernel-default-man-3.0.101-108.120.1.s390x", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.120.1.s390x", product: { name: "kernel-source-3.0.101-108.120.1.s390x", product_id: "kernel-source-3.0.101-108.120.1.s390x", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.120.1.s390x", product: { name: "kernel-syms-3.0.101-108.120.1.s390x", product_id: "kernel-syms-3.0.101-108.120.1.s390x", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.120.1.s390x", product: { name: "kernel-trace-3.0.101-108.120.1.s390x", product_id: "kernel-trace-3.0.101-108.120.1.s390x", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.120.1.s390x", product: { name: "kernel-trace-base-3.0.101-108.120.1.s390x", product_id: "kernel-trace-base-3.0.101-108.120.1.s390x", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.120.1.s390x", product: { name: "kernel-trace-devel-3.0.101-108.120.1.s390x", product_id: "kernel-trace-devel-3.0.101-108.120.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "kernel-default-3.0.101-108.120.1.x86_64", product: { name: "kernel-default-3.0.101-108.120.1.x86_64", product_id: "kernel-default-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-3.0.101-108.120.1.x86_64", product: { name: "kernel-default-base-3.0.101-108.120.1.x86_64", product_id: "kernel-default-base-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-3.0.101-108.120.1.x86_64", product: { name: "kernel-default-devel-3.0.101-108.120.1.x86_64", product_id: "kernel-default-devel-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-3.0.101-108.120.1.x86_64", product: { name: "kernel-ec2-3.0.101-108.120.1.x86_64", product_id: "kernel-ec2-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-base-3.0.101-108.120.1.x86_64", product: { name: "kernel-ec2-base-3.0.101-108.120.1.x86_64", product_id: "kernel-ec2-base-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-ec2-devel-3.0.101-108.120.1.x86_64", product: { name: "kernel-ec2-devel-3.0.101-108.120.1.x86_64", product_id: "kernel-ec2-devel-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-source-3.0.101-108.120.1.x86_64", product: { name: "kernel-source-3.0.101-108.120.1.x86_64", product_id: "kernel-source-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-3.0.101-108.120.1.x86_64", product: { name: "kernel-syms-3.0.101-108.120.1.x86_64", product_id: "kernel-syms-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-3.0.101-108.120.1.x86_64", product: { name: "kernel-trace-3.0.101-108.120.1.x86_64", product_id: "kernel-trace-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-base-3.0.101-108.120.1.x86_64", product: { name: "kernel-trace-base-3.0.101-108.120.1.x86_64", product_id: "kernel-trace-base-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-trace-devel-3.0.101-108.120.1.x86_64", product: { name: "kernel-trace-devel-3.0.101-108.120.1.x86_64", product_id: "kernel-trace-devel-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-3.0.101-108.120.1.x86_64", product: { name: "kernel-xen-3.0.101-108.120.1.x86_64", product_id: "kernel-xen-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-base-3.0.101-108.120.1.x86_64", product: { name: "kernel-xen-base-3.0.101-108.120.1.x86_64", product_id: "kernel-xen-base-3.0.101-108.120.1.x86_64", }, }, { category: "product_version", name: "kernel-xen-devel-3.0.101-108.120.1.x86_64", product: { name: "kernel-xen-devel-3.0.101-108.120.1.x86_64", product_id: "kernel-xen-devel-3.0.101-108.120.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:suse_sles:11:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-bigmem-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-bigmem-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-base-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-bigmem-base-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-bigmem-devel-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-bigmem-devel-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", }, product_reference: "kernel-default-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-default-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", }, product_reference: "kernel-default-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-default-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", }, product_reference: "kernel-default-base-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-default-base-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", }, product_reference: "kernel-default-base-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-default-base-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", }, product_reference: "kernel-default-devel-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-default-devel-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", }, product_reference: "kernel-default-devel-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-default-devel-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", }, product_reference: "kernel-default-man-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", }, product_reference: "kernel-ec2-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-ec2-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", }, product_reference: "kernel-ec2-base-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-base-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-ec2-base-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", }, product_reference: "kernel-ec2-devel-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ec2-devel-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-ec2-devel-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", }, product_reference: "kernel-pae-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", }, product_reference: "kernel-pae-base-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-pae-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", }, product_reference: "kernel-pae-devel-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-ppc64-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-base-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-ppc64-base-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-ppc64-devel-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-ppc64-devel-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", }, product_reference: "kernel-source-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-source-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", }, product_reference: "kernel-source-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-source-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", }, product_reference: "kernel-syms-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-syms-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", }, product_reference: "kernel-syms-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-syms-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", }, product_reference: "kernel-trace-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-trace-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", }, product_reference: "kernel-trace-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-trace-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", }, product_reference: "kernel-trace-base-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-trace-base-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", }, product_reference: "kernel-trace-base-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-base-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-trace-base-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", }, product_reference: "kernel-trace-devel-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.120.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", }, product_reference: "kernel-trace-devel-3.0.101-108.120.1.ppc64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.120.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", }, product_reference: "kernel-trace-devel-3.0.101-108.120.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-trace-devel-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-trace-devel-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", }, product_reference: "kernel-xen-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-xen-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", }, product_reference: "kernel-xen-base-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-base-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-xen-base-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-108.120.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", }, product_reference: "kernel-xen-devel-3.0.101-108.120.1.i586", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-xen-devel-3.0.101-108.120.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", }, product_reference: "kernel-xen-devel-3.0.101-108.120.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 11 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2019-16746", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-16746", }, ], notes: [ { category: "general", text: "An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-16746", url: "https://www.suse.com/security/cve/CVE-2019-16746", }, { category: "external", summary: "SUSE Bug 1152107 for CVE-2019-16746", url: "https://bugzilla.suse.com/1152107", }, { category: "external", summary: "SUSE Bug 1173659 for CVE-2019-16746", url: "https://bugzilla.suse.com/1173659", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2019-16746", }, { cve: "CVE-2020-0404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0404", }, ], notes: [ { category: "general", text: "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0404", url: "https://www.suse.com/security/cve/CVE-2020-0404", }, { category: "external", summary: "SUSE Bug 1176423 for CVE-2020-0404", url: "https://bugzilla.suse.com/1176423", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-0404", }, { cve: "CVE-2020-0431", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0431", }, ], notes: [ { category: "general", text: "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0431", url: "https://www.suse.com/security/cve/CVE-2020-0431", }, { category: "external", summary: "SUSE Bug 1176722 for CVE-2020-0431", url: "https://bugzilla.suse.com/1176722", }, { category: "external", summary: "SUSE Bug 1176896 for CVE-2020-0431", url: "https://bugzilla.suse.com/1176896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-0431", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-14331", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14331", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14331", url: "https://www.suse.com/security/cve/CVE-2020-14331", }, { category: "external", summary: "SUSE Bug 1174205 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174205", }, { category: "external", summary: "SUSE Bug 1174247 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-14331", }, { cve: "CVE-2020-14353", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14353", }, ], notes: [ { category: "general", text: "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14353", url: "https://www.suse.com/security/cve/CVE-2020-14353", }, { category: "external", summary: "SUSE Bug 1174993 for CVE-2020-14353", url: "https://bugzilla.suse.com/1174993", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-14353", }, { cve: "CVE-2020-14381", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14381", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14381", url: "https://www.suse.com/security/cve/CVE-2020-14381", }, { category: "external", summary: "SUSE Bug 1176011 for CVE-2020-14381", url: "https://bugzilla.suse.com/1176011", }, { category: "external", summary: "SUSE Bug 1176012 for CVE-2020-14381", url: "https://bugzilla.suse.com/1176012", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-14381", }, { cve: "CVE-2020-14390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14390", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14390", url: "https://www.suse.com/security/cve/CVE-2020-14390", }, { category: "external", summary: "SUSE Bug 1176235 for CVE-2020-14390", url: "https://bugzilla.suse.com/1176235", }, { category: "external", summary: "SUSE Bug 1176253 for CVE-2020-14390", url: "https://bugzilla.suse.com/1176253", }, { category: "external", summary: "SUSE Bug 1176278 for CVE-2020-14390", url: "https://bugzilla.suse.com/1176278", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-14390", }, { cve: "CVE-2020-15436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15436", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15436", url: "https://www.suse.com/security/cve/CVE-2020-15436", }, { category: "external", summary: "SUSE Bug 1179141 for CVE-2020-15436", url: "https://bugzilla.suse.com/1179141", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-15436", }, { cve: "CVE-2020-15437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15437", }, ], notes: [ { category: "general", text: "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15437", url: "https://www.suse.com/security/cve/CVE-2020-15437", }, { category: "external", summary: "SUSE Bug 1179140 for CVE-2020-15437", url: "https://bugzilla.suse.com/1179140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-15437", }, { cve: "CVE-2020-25211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25211", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25211", url: "https://www.suse.com/security/cve/CVE-2020-25211", }, { category: "external", summary: "SUSE Bug 1176395 for CVE-2020-25211", url: "https://bugzilla.suse.com/1176395", }, { category: "external", summary: "SUSE Bug 1192356 for CVE-2020-25211", url: "https://bugzilla.suse.com/1192356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-25211", }, { cve: "CVE-2020-25284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25284", }, ], notes: [ { category: "general", text: "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25284", url: "https://www.suse.com/security/cve/CVE-2020-25284", }, { category: "external", summary: "SUSE Bug 1176482 for CVE-2020-25284", url: "https://bugzilla.suse.com/1176482", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-25284", }, { cve: "CVE-2020-25285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25285", }, ], notes: [ { category: "general", text: "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25285", url: "https://www.suse.com/security/cve/CVE-2020-25285", }, { category: "external", summary: "SUSE Bug 1176485 for CVE-2020-25285", url: "https://bugzilla.suse.com/1176485", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-25285", }, { cve: "CVE-2020-25643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25643", }, ], notes: [ { category: "general", text: "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25643", url: "https://www.suse.com/security/cve/CVE-2020-25643", }, { category: "external", summary: "SUSE Bug 1177206 for CVE-2020-25643", url: "https://bugzilla.suse.com/1177206", }, { category: "external", summary: "SUSE Bug 1177226 for CVE-2020-25643", url: "https://bugzilla.suse.com/1177226", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-25643", }, { cve: "CVE-2020-25656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25656", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25656", url: "https://www.suse.com/security/cve/CVE-2020-25656", }, { category: "external", summary: "SUSE Bug 1177766 for CVE-2020-25656", url: "https://bugzilla.suse.com/1177766", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-25656", }, { cve: "CVE-2020-25668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25668", }, ], notes: [ { category: "general", text: "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25668", url: "https://www.suse.com/security/cve/CVE-2020-25668", }, { category: "external", summary: "SUSE Bug 1178123 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178123", }, { category: "external", summary: "SUSE Bug 1178622 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178622", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2020-25668", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-25668", }, { cve: "CVE-2020-25669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25669", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25669", url: "https://www.suse.com/security/cve/CVE-2020-25669", }, { category: "external", summary: "SUSE Bug 1178182 for CVE-2020-25669", url: "https://bugzilla.suse.com/1178182", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-25669", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-28915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28915", }, ], notes: [ { category: "general", text: "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28915", url: "https://www.suse.com/security/cve/CVE-2020-28915", }, { category: "external", summary: "SUSE Bug 1178886 for CVE-2020-28915", url: "https://bugzilla.suse.com/1178886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-28915", }, { cve: "CVE-2020-28974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28974", }, ], notes: [ { category: "general", text: "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28974", url: "https://www.suse.com/security/cve/CVE-2020-28974", }, { category: "external", summary: "SUSE Bug 1178589 for CVE-2020-28974", url: "https://bugzilla.suse.com/1178589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-28974", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "moderate", }, ], title: "CVE-2020-4788", }, { cve: "CVE-2021-3347", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3347", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3347", url: "https://www.suse.com/security/cve/CVE-2021-3347", }, { category: "external", summary: "SUSE Bug 1181349 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181349", }, { category: "external", summary: "SUSE Bug 1181553 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181553", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2021-3347", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.120.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.120.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-16T15:31:37Z", details: "important", }, ], title: "CVE-2021-3347", }, ], }
suse-su-2021:0117-1
Vulnerability from csaf_suse
Published
2021-01-14 05:15
Modified
2021-01-14 05:15
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).
The following non-security bugs were fixed:
- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: * context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: * context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: * context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: * context fixes * adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: * context fixes * adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: * context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: * context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: * context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: * context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: * changed filename from vkms_composer.c to vkms_crc.c * context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: * context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: * context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: * context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head->lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns->head->lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl->sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address & portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix ->session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
Patchnames
SUSE-2021-117,SUSE-SLE-Module-Basesystem-15-SP2-2021-117,SUSE-SLE-Module-Development-Tools-15-SP2-2021-117,SUSE-SLE-Module-Legacy-15-SP2-2021-117,SUSE-SLE-Module-Live-Patching-15-SP2-2021-117,SUSE-SLE-Product-HA-15-SP2-2021-117,SUSE-SLE-Product-WE-15-SP2-2021-117
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).\n- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).\n- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).\n- ALSA: core: memalloc: add page alignment for iram (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).\n- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).\n- ALSA: hda/proc - print DP-MST connections (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).\n- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).\n- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).\n- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).\n- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).\n- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).\n- ALSA: seq: remove useless function (git-fixes).\n- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).\n- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).\n- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).\n- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).\n- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).\n- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).\n- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).\n- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).\n- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).\n- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).\n- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).\n- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).\n- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).\n- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).\n- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).\n- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).\n- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).\n- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).\n- ALSA: usb-audio: Drop debug.h (bsc#1178203).\n- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).\n- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).\n- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).\n- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).\n- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).\n- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).\n- ALSA: usb-audio: Improve some debug prints (bsc#1178203).\n- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).\n- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).\n- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).\n- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).\n- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).\n- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).\n- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).\n- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).\n- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).\n- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).\n- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).\n- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).\n- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).\n- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).\n- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).\n- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).\n- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).\n- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).\n- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).\n- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).\n- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).\n- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).\n- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).\n- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).\n- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).\n- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).\n- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).\n- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: meson: fix COMPILE_TEST error (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).\n- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).\n- ASoC: tegra20-spdif: remove 'default m' (git-fixes).\n- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- batman-adv: Consider fragmentation for needed_headroom (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- batman-adv: Reserve needed_*room for fragments (git-fixes).\n- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).\n- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).\n- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).\n- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).\n- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).\n- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).\n- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).\n- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).\n- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).\n- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).\n- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).\n- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: c_can: c_can_power_up(): fix error handling (git-fixes).\n- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).\n- cifs: do not share tcons with DFS (bsc#1178270).\n- cifs: document and cleanup dfs mount (bsc#1178270).\n- cifs: ensure correct super block for DFS reconnect (bsc#1178270).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).\n- cifs: fix double free error on share and prefix (bsc#1178270).\n- cifs: fix leaked reference on requeued write (bsc#1178270).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).\n- cifs: rename reconn_inval_dfs_target() (bsc#1178270).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).\n- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).\n- clk: ingenic: Fix divider calculation with div tables (git-fixes).\n- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Do not return 0 on failure (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).\n- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).\n- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).\n- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).\n- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).\n- coredump: fix core_pattern parse error (git-fixes).\n- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).\n- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).\n- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).\n- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).\n- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)\n- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: \t* context fixes\n- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)\n- drm/gma500: fix error check (bsc#1152472) Backporting changes: \t* context fixes\n- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: \t* context fixes\n- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: \t* context fixes \t* adapted I/O functions to old driver\n- drm/imx: tve remove extraneous type qualifier (bsc#1152489)\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)\n- drm/mediatek: Add missing put_device() call in (bsc#1152472)\n- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: \t* context fixes \t* adapted to function layout\n- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)\n- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: \t* context fixes\n- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)\n- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: \t* context fixes\n- drm/radeon: Prefer lower feedback dividers (bsc#1152489)\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)\n- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)\n- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: \t* context fixes\n- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: \t* context fixes\n- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: \t* changed filename from vkms_composer.c to vkms_crc.c \t* context fixes\n- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: \t* context fixes\n- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: \t* context fixes\n- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)\n- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: \t* context fixes\n- drm: rcar-du: Put reference to VSP device (bsc#1152489)\n- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).\n- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).\n- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ethtool: fix error handling in ethtool_phys_id (git-fixes).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fail_function: Remove a redundant mutex unlock (bsc#1149032).\n- fbcon: Remove the superfluous break (bsc#1152472)\n- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- fs/minix: check return value of sb_getblk() (bsc#1179676).\n- fs/minix: do not allow getting deleted inodes (bsc#1179677).\n- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).\n- fs/minix: reject too-large maximum file size (bsc#1179678).\n- fs/minix: remove expected error message in block_to_path() (bsc#1179681).\n- fs/minix: set s_maxbytes correctly (bsc#1179679).\n- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).\n- geneve: pull IP header before ECN decapsulation (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).\n- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).\n- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).\n- HID: add support for Sega Saturn (git-fixes).\n- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).\n- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).\n- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).\n- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).\n- HMAT: Register memory-side cache after parsing (bsc#1178660).\n- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).\n- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)\n- IB/mlx4: Add and improve logging (bsc#1152489)\n- IB/mlx4: Add support for MRA (bsc#1152489)\n- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)\n- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)\n- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)\n- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)\n- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)\n- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).\n- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- iomap: Clear page error before beginning a write (bsc#1179683).\n- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).\n- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).\n- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: hook up missing RX handlers (git-fixes).\n- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for USB audio driver (bsc#1178203).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).\n- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).\n- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).\n- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: imx214: Fix stop streaming (git-fixes).\n- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).\n- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).\n- media: ipu3-cio2: Return actual subdev format (git-fixes).\n- media: ipu3-cio2: Serialise access to pad format (git-fixes).\n- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).\n- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: tm6000: Fix sizeof() mismatches (git-fixes).\n- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).\n- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).\n- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).\n- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).\n- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).\n- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).\n- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).\n- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).\n- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).\n- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).\n- mtd: spinand: Fix OOB read (git-fixes).\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nvme-fabrics: allow to queue requests for live queues (git-fixes).\n- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).\n- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).\n- nvme-fc: cancel async events before freeing event struct (git-fixes).\n- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).\n- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).\n- nvme-fc: fix io timeout to abort I/O (bsc#1177326).\n- nvme-fc: remove err_work work item (bsc#1177326).\n- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).\n- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).\n- nvme-fc: track error_recovery while connecting (bsc#1177326).\n- nvme-fc: wait for queues to freeze before calling (git-fixes).\n- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).\n- nvme-multipath: fix deadlock due to head->lock (git-fixes).\n- nvme-pci: properly print controller address (git-fixes).\n- nvme-rdma: avoid race between time out and tear down (bsc#1179519).\n- nvme-rdma: avoid repeated request completion (bsc#1179519).\n- nvme-rdma: cancel async events before freeing event struct (git-fixes).\n- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).\n- nvme-rdma: fix timeout handler (bsc#1179519).\n- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).\n- nvme-rdma: serialize controller teardown sequences (bsc#1179519).\n- nvme-tcp: avoid race between time out and tear down (bsc#1179519).\n- nvme-tcp: avoid repeated request completion (bsc#1179519).\n- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).\n- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).\n- nvme-tcp: cancel async events before freeing event struct (git-fixes).\n- nvme-tcp: do not poll a non-live queue (bsc#1179519).\n- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).\n- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).\n- nvme-tcp: fix possible leakage during error flow (git-fixes).\n- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).\n- nvme-tcp: fix timeout handler (bsc#1179519).\n- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).\n- nvme-tcp: leverage request plugging (bsc#1179519).\n- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).\n- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).\n- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).\n- nvme-tcp: serialize controller teardown sequences (bsc#1179519).\n- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).\n- nvme-tcp: try to send request in queue_rq context (bsc#1179519).\n- nvme-tcp: use bh_lock in data_ready (bsc#1179519).\n- nvme: do not protect ns mutation with ns->head->lock (git-fixes).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).\n- nvme: introduce nvme_sync_io_queues (bsc#1179519).\n- nvme: Revert: Fix controller creation races with teardown (git-fixes).\n- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).\n- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).\n- PCI: Fix overflow in command-line resource alignment requests (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- PCI: iproc: Fix out-of-bound array accesses (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).\n- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).\n- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).\n- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).\n- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).\n- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- pwm: zx: Add missing cleanup in error path (git-fixes).\n- qede: Notify qedr when mtu has changed (bsc#1152489)\n- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)\n- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)\n- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)\n- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)\n- RDMA/core: Fix reported speed and width (bsc#1152489)\n- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)\n- RDMA/core: Free DIM memory in error unwind (bsc#1152489)\n- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)\n- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)\n- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)\n- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)\n- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)\n- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)\n- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)\n- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)\n- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)\n- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)\n- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)\n- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)\n- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)\n- RDMA/qedr: Fix doorbell setting (bsc#1152489)\n- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)\n- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)\n- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)\n- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)\n- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)\n- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)\n- RDMA/qedr: SRQ's bug fixes (bsc#1152489)\n- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)\n- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)\n- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)\n- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)\n- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)\n- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489)\n- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)\n- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)\n- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)\n- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)\n- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)\n- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)\n- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)\n- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).\n- regulator: mcp16502: add linear_min_sel (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).\n- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).\n- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).\n- rsi: fix error return code in rsi_reset_card() (git-fixes).\n- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: delay draining the TX buffers (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).\n- s390: add 3f program exception handler (git-fixes).\n- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).\n- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).\n- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)\n- sched/fair: Fix race between runtime distribution and (git-fixes)\n- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)\n- sched/fair: Refill bandwidth before scaling (git-fixes)\n- sched: correct SD_flags returned by tl->sd_flags() (git-fixes)\n- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).\n- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).\n- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).\n- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).\n- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).\n- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).\n- scsi: fnic: Validate io_req before others (bsc#1175079).\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Get device objects using sas_address & portID (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).\n- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).\n- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).\n- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).\n- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).\n- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).\n- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).\n- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).\n- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: geni: More properly switch to DMA mode (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- speakup: fix uninitialized flush_lock (git-fixes).\n- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).\n- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: fix resource leak for drivers without .remove callback (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: mt7621: Disable clock in probe error path (git-fixes).\n- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).\n- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).\n- spi: synquacer: Disable clock in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).\n- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).\n- tty: Fix ->session locking (bsc#1179745).\n- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).\n- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).\n- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).\n- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).\n- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).\n- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).\n- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).\n- udf: Fix memory leak when mounting (bsc#1179712).\n- usb/max3421: fix return error code in max3421_probe() (git-fixes).\n- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: kl5kusb105: fix memleak on open (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: serial: option: fix Quectel BG96 matching (git-fixes).\n- usb: UAS: introduce a quirk to set no_write_same (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)\n- video: fbdev: sis: fix null ptr dereference (bsc#1152472)\n- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: Fix potential dereferencing of null pointer (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).\n- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).\n- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).\n- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).\n- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).\n- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).\n- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).\n- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).\n- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).\n- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).\n- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).\n- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-117,SUSE-SLE-Module-Basesystem-15-SP2-2021-117,SUSE-SLE-Module-Development-Tools-15-SP2-2021-117,SUSE-SLE-Module-Legacy-15-SP2-2021-117,SUSE-SLE-Module-Live-Patching-15-SP2-2021-117,SUSE-SLE-Product-HA-15-SP2-2021-117,SUSE-SLE-Product-WE-15-SP2-2021-117", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0117-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0117-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210117-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0117-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008196.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1149032", url: "https://bugzilla.suse.com/1149032", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1156315", url: "https://bugzilla.suse.com/1156315", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1158775", url: "https://bugzilla.suse.com/1158775", }, { category: "self", summary: "SUSE Bug 1161099", url: "https://bugzilla.suse.com/1161099", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1165933", url: "https://bugzilla.suse.com/1165933", }, { category: "self", summary: "SUSE Bug 1167657", url: "https://bugzilla.suse.com/1167657", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1171000", url: "https://bugzilla.suse.com/1171000", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1171688", url: "https://bugzilla.suse.com/1171688", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172733", url: "https://bugzilla.suse.com/1172733", }, { category: "self", summary: "SUSE Bug 1174486", url: "https://bugzilla.suse.com/1174486", }, { category: "self", summary: "SUSE Bug 1175079", url: "https://bugzilla.suse.com/1175079", }, { category: "self", summary: "SUSE Bug 1175480", url: "https://bugzilla.suse.com/1175480", }, { category: "self", summary: "SUSE Bug 1175995", url: "https://bugzilla.suse.com/1175995", }, { category: "self", summary: "SUSE Bug 1176396", url: "https://bugzilla.suse.com/1176396", }, { category: "self", summary: "SUSE Bug 1176942", url: "https://bugzilla.suse.com/1176942", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177500", url: "https://bugzilla.suse.com/1177500", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1177679", url: "https://bugzilla.suse.com/1177679", }, { category: "self", summary: "SUSE Bug 1177733", url: "https://bugzilla.suse.com/1177733", }, { category: "self", summary: "SUSE Bug 1178049", url: "https://bugzilla.suse.com/1178049", }, { category: "self", summary: "SUSE Bug 1178203", url: "https://bugzilla.suse.com/1178203", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178372", url: "https://bugzilla.suse.com/1178372", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178612", url: "https://bugzilla.suse.com/1178612", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178660", url: "https://bugzilla.suse.com/1178660", }, { category: "self", summary: "SUSE Bug 1178756", url: "https://bugzilla.suse.com/1178756", }, { category: "self", summary: "SUSE Bug 1178780", url: "https://bugzilla.suse.com/1178780", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179434", url: "https://bugzilla.suse.com/1179434", }, { category: "self", summary: "SUSE Bug 1179435", url: "https://bugzilla.suse.com/1179435", }, { category: "self", summary: "SUSE Bug 1179519", url: "https://bugzilla.suse.com/1179519", }, { category: "self", summary: "SUSE Bug 1179575", url: "https://bugzilla.suse.com/1179575", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179604", url: "https://bugzilla.suse.com/1179604", }, { category: "self", summary: "SUSE Bug 1179639", url: "https://bugzilla.suse.com/1179639", }, { category: "self", summary: "SUSE Bug 1179652", url: "https://bugzilla.suse.com/1179652", }, { category: "self", summary: "SUSE Bug 1179656", url: "https://bugzilla.suse.com/1179656", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179675", url: "https://bugzilla.suse.com/1179675", }, { category: "self", summary: "SUSE Bug 1179676", url: "https://bugzilla.suse.com/1179676", }, { category: "self", summary: "SUSE Bug 1179677", url: "https://bugzilla.suse.com/1179677", }, { category: "self", summary: "SUSE Bug 1179678", url: "https://bugzilla.suse.com/1179678", }, { category: "self", summary: "SUSE Bug 1179679", url: "https://bugzilla.suse.com/1179679", }, { category: "self", summary: "SUSE Bug 1179680", url: "https://bugzilla.suse.com/1179680", }, { category: "self", summary: "SUSE Bug 1179681", url: "https://bugzilla.suse.com/1179681", }, { category: "self", summary: "SUSE Bug 1179682", url: "https://bugzilla.suse.com/1179682", }, { category: "self", summary: "SUSE Bug 1179683", url: "https://bugzilla.suse.com/1179683", }, { category: "self", summary: "SUSE Bug 1179684", url: "https://bugzilla.suse.com/1179684", }, { category: "self", summary: "SUSE Bug 1179685", url: "https://bugzilla.suse.com/1179685", }, { category: "self", summary: "SUSE Bug 1179687", url: "https://bugzilla.suse.com/1179687", }, { category: "self", summary: "SUSE Bug 1179688", url: "https://bugzilla.suse.com/1179688", }, { category: "self", summary: "SUSE Bug 1179689", url: "https://bugzilla.suse.com/1179689", }, { category: "self", summary: "SUSE Bug 1179690", url: "https://bugzilla.suse.com/1179690", }, { category: "self", summary: "SUSE Bug 1179703", url: "https://bugzilla.suse.com/1179703", }, { category: "self", summary: "SUSE Bug 1179704", url: "https://bugzilla.suse.com/1179704", }, { category: "self", summary: "SUSE Bug 1179707", url: "https://bugzilla.suse.com/1179707", }, { category: "self", summary: "SUSE Bug 1179709", url: "https://bugzilla.suse.com/1179709", }, { category: "self", summary: "SUSE Bug 1179710", url: "https://bugzilla.suse.com/1179710", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179712", url: "https://bugzilla.suse.com/1179712", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179763", url: "https://bugzilla.suse.com/1179763", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179892", url: "https://bugzilla.suse.com/1179892", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180056", url: "https://bugzilla.suse.com/1180056", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180261", url: "https://bugzilla.suse.com/1180261", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE Bug 1180541", url: "https://bugzilla.suse.com/1180541", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180566", url: "https://bugzilla.suse.com/1180566", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-27830 page", url: "https://www.suse.com/security/cve/CVE-2020-27830/", }, { category: "self", summary: "SUSE CVE CVE-2020-28374 page", url: "https://www.suse.com/security/cve/CVE-2020-28374/", }, { category: "self", summary: "SUSE CVE CVE-2020-29370 page", url: "https://www.suse.com/security/cve/CVE-2020-29370/", }, { category: "self", summary: "SUSE CVE CVE-2020-29373 page", url: "https://www.suse.com/security/cve/CVE-2020-29373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-14T05:15:00Z", generator: { date: "2021-01-14T05:15:00Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0117-1", initial_release_date: "2021-01-14T05:15:00Z", revision_history: [ { date: "2021-01-14T05:15:00Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.46.1.aarch64", product: { name: "cluster-md-kmp-default-5.3.18-24.46.1.aarch64", product_id: "cluster-md-kmp-default-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-24.46.1.aarch64", product: { name: "cluster-md-kmp-preempt-5.3.18-24.46.1.aarch64", product_id: "cluster-md-kmp-preempt-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.46.1.aarch64", product: { name: "dlm-kmp-default-5.3.18-24.46.1.aarch64", product_id: "dlm-kmp-default-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-24.46.1.aarch64", product: { name: "dlm-kmp-preempt-5.3.18-24.46.1.aarch64", product_id: "dlm-kmp-preempt-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.46.1.aarch64", product: { name: "gfs2-kmp-default-5.3.18-24.46.1.aarch64", product_id: "gfs2-kmp-default-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-24.46.1.aarch64", product: { name: "gfs2-kmp-preempt-5.3.18-24.46.1.aarch64", product_id: "gfs2-kmp-preempt-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.46.1.aarch64", product: { name: "kernel-default-5.3.18-24.46.1.aarch64", product_id: "kernel-default-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", product: { name: "kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", product_id: "kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.aarch64", product: { name: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.aarch64", product_id: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.46.1.aarch64", product: { name: "kernel-default-devel-5.3.18-24.46.1.aarch64", product_id: "kernel-default-devel-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.46.1.aarch64", product: { name: "kernel-default-extra-5.3.18-24.46.1.aarch64", product_id: "kernel-default-extra-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.46.1.aarch64", product: { name: "kernel-default-livepatch-5.3.18-24.46.1.aarch64", product_id: "kernel-default-livepatch-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.46.1.aarch64", product: { name: "kernel-default-livepatch-devel-5.3.18-24.46.1.aarch64", product_id: "kernel-default-livepatch-devel-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.46.1.aarch64", product: { name: "kernel-obs-build-5.3.18-24.46.1.aarch64", product_id: "kernel-obs-build-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.46.1.aarch64", product: { name: "kernel-obs-qa-5.3.18-24.46.1.aarch64", product_id: "kernel-obs-qa-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-24.46.1.aarch64", product: { name: "kernel-preempt-5.3.18-24.46.1.aarch64", product_id: "kernel-preempt-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-24.46.1.aarch64", product: { name: "kernel-preempt-devel-5.3.18-24.46.1.aarch64", product_id: "kernel-preempt-devel-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-24.46.1.aarch64", product: { name: "kernel-preempt-extra-5.3.18-24.46.1.aarch64", product_id: "kernel-preempt-extra-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-24.46.1.aarch64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-24.46.1.aarch64", product_id: "kernel-preempt-livepatch-devel-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.46.1.aarch64", product: { name: "kernel-syms-5.3.18-24.46.1.aarch64", product_id: "kernel-syms-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.46.1.aarch64", product: { name: "kselftests-kmp-default-5.3.18-24.46.1.aarch64", product_id: "kselftests-kmp-default-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-24.46.1.aarch64", product: { name: "kselftests-kmp-preempt-5.3.18-24.46.1.aarch64", product_id: "kselftests-kmp-preempt-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.46.1.aarch64", product: { name: "ocfs2-kmp-default-5.3.18-24.46.1.aarch64", product_id: "ocfs2-kmp-default-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-24.46.1.aarch64", product: { name: "ocfs2-kmp-preempt-5.3.18-24.46.1.aarch64", product_id: "ocfs2-kmp-preempt-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.46.1.aarch64", product: { name: "reiserfs-kmp-default-5.3.18-24.46.1.aarch64", product_id: "reiserfs-kmp-default-5.3.18-24.46.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-24.46.1.aarch64", product: { name: "reiserfs-kmp-preempt-5.3.18-24.46.1.aarch64", product_id: "reiserfs-kmp-preempt-5.3.18-24.46.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-24.46.1.noarch", product: { name: "kernel-devel-5.3.18-24.46.1.noarch", product_id: "kernel-devel-5.3.18-24.46.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-24.46.1.noarch", product: { name: "kernel-docs-5.3.18-24.46.1.noarch", product_id: "kernel-docs-5.3.18-24.46.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-24.46.1.noarch", product: { name: "kernel-docs-html-5.3.18-24.46.1.noarch", product_id: "kernel-docs-html-5.3.18-24.46.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-24.46.1.noarch", product: { name: "kernel-macros-5.3.18-24.46.1.noarch", product_id: "kernel-macros-5.3.18-24.46.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-24.46.1.noarch", product: { name: "kernel-source-5.3.18-24.46.1.noarch", product_id: "kernel-source-5.3.18-24.46.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-24.46.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-24.46.1.noarch", product_id: "kernel-source-vanilla-5.3.18-24.46.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", product: { name: "cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", product_id: "cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.46.1.ppc64le", product: { name: "dlm-kmp-default-5.3.18-24.46.1.ppc64le", product_id: "dlm-kmp-default-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.46.1.ppc64le", product: { name: "gfs2-kmp-default-5.3.18-24.46.1.ppc64le", product_id: "gfs2-kmp-default-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-5.3.18-24.46.1.ppc64le", product: { name: "kernel-debug-5.3.18-24.46.1.ppc64le", product_id: "kernel-debug-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-24.46.1.ppc64le", product: { name: "kernel-debug-devel-5.3.18-24.46.1.ppc64le", product_id: "kernel-debug-devel-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-24.46.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-5.3.18-24.46.1.ppc64le", product_id: "kernel-debug-livepatch-devel-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.46.1.ppc64le", product: { name: "kernel-default-5.3.18-24.46.1.ppc64le", product_id: "kernel-default-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", product: { name: "kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", product_id: "kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.ppc64le", product: { name: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.ppc64le", product_id: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.46.1.ppc64le", product: { name: "kernel-default-devel-5.3.18-24.46.1.ppc64le", product_id: "kernel-default-devel-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.46.1.ppc64le", product: { name: "kernel-default-extra-5.3.18-24.46.1.ppc64le", product_id: "kernel-default-extra-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.46.1.ppc64le", product: { name: "kernel-default-livepatch-5.3.18-24.46.1.ppc64le", product_id: "kernel-default-livepatch-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", product: { name: "kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", product_id: "kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-24.46.1.ppc64le", product: { name: "kernel-kvmsmall-5.3.18-24.46.1.ppc64le", product_id: "kernel-kvmsmall-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-24.46.1.ppc64le", product: { name: "kernel-kvmsmall-devel-5.3.18-24.46.1.ppc64le", product_id: "kernel-kvmsmall-devel-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.46.1.ppc64le", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.46.1.ppc64le", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", product: { name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", product_id: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.46.1.ppc64le", product: { name: "kernel-obs-build-5.3.18-24.46.1.ppc64le", product_id: "kernel-obs-build-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.46.1.ppc64le", product: { name: "kernel-obs-qa-5.3.18-24.46.1.ppc64le", product_id: "kernel-obs-qa-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.46.1.ppc64le", product: { name: "kernel-syms-5.3.18-24.46.1.ppc64le", product_id: "kernel-syms-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.46.1.ppc64le", product: { name: "kselftests-kmp-default-5.3.18-24.46.1.ppc64le", product_id: "kselftests-kmp-default-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", product: { name: "ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", product_id: "ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", product: { name: "reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", product_id: "reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.46.1.s390x", product: { name: "cluster-md-kmp-default-5.3.18-24.46.1.s390x", product_id: "cluster-md-kmp-default-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.46.1.s390x", product: { name: "dlm-kmp-default-5.3.18-24.46.1.s390x", product_id: "dlm-kmp-default-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.46.1.s390x", product: { name: "gfs2-kmp-default-5.3.18-24.46.1.s390x", product_id: "gfs2-kmp-default-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.46.1.s390x", product: { name: "kernel-default-5.3.18-24.46.1.s390x", product_id: "kernel-default-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", product: { name: "kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", product_id: "kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.s390x", product: { name: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.s390x", product_id: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.46.1.s390x", product: { name: "kernel-default-devel-5.3.18-24.46.1.s390x", product_id: "kernel-default-devel-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.46.1.s390x", product: { name: "kernel-default-extra-5.3.18-24.46.1.s390x", product_id: "kernel-default-extra-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.46.1.s390x", product: { name: "kernel-default-livepatch-5.3.18-24.46.1.s390x", product_id: "kernel-default-livepatch-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", product: { name: "kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", product_id: "kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", product: { name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", product_id: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.46.1.s390x", product: { name: "kernel-obs-build-5.3.18-24.46.1.s390x", product_id: "kernel-obs-build-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.46.1.s390x", product: { name: "kernel-obs-qa-5.3.18-24.46.1.s390x", product_id: "kernel-obs-qa-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.46.1.s390x", product: { name: "kernel-syms-5.3.18-24.46.1.s390x", product_id: "kernel-syms-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-5.3.18-24.46.1.s390x", product: { name: "kernel-zfcpdump-5.3.18-24.46.1.s390x", product_id: "kernel-zfcpdump-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.46.1.s390x", product: { name: "kselftests-kmp-default-5.3.18-24.46.1.s390x", product_id: "kselftests-kmp-default-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.46.1.s390x", product: { name: "ocfs2-kmp-default-5.3.18-24.46.1.s390x", product_id: "ocfs2-kmp-default-5.3.18-24.46.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.46.1.s390x", product: { name: "reiserfs-kmp-default-5.3.18-24.46.1.s390x", product_id: "reiserfs-kmp-default-5.3.18-24.46.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-5.3.18-24.46.1.x86_64", product: { name: "cluster-md-kmp-default-5.3.18-24.46.1.x86_64", product_id: "cluster-md-kmp-default-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-preempt-5.3.18-24.46.1.x86_64", product: { name: "cluster-md-kmp-preempt-5.3.18-24.46.1.x86_64", product_id: "cluster-md-kmp-preempt-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-5.3.18-24.46.1.x86_64", product: { name: "dlm-kmp-default-5.3.18-24.46.1.x86_64", product_id: "dlm-kmp-default-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-preempt-5.3.18-24.46.1.x86_64", product: { name: "dlm-kmp-preempt-5.3.18-24.46.1.x86_64", product_id: "dlm-kmp-preempt-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-5.3.18-24.46.1.x86_64", product: { name: "gfs2-kmp-default-5.3.18-24.46.1.x86_64", product_id: "gfs2-kmp-default-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-preempt-5.3.18-24.46.1.x86_64", product: { name: "gfs2-kmp-preempt-5.3.18-24.46.1.x86_64", product_id: "gfs2-kmp-preempt-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-5.3.18-24.46.1.x86_64", product: { name: "kernel-debug-5.3.18-24.46.1.x86_64", product_id: "kernel-debug-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-24.46.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-24.46.1.x86_64", product_id: "kernel-debug-devel-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-5.3.18-24.46.1.x86_64", product: { name: "kernel-debug-livepatch-devel-5.3.18-24.46.1.x86_64", product_id: "kernel-debug-livepatch-devel-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-24.46.1.x86_64", product: { name: "kernel-default-5.3.18-24.46.1.x86_64", product_id: "kernel-default-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", product: { name: "kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", product_id: "kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.x86_64", product: { name: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.x86_64", product_id: "kernel-default-base-rebuild-5.3.18-24.46.1.9.19.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-24.46.1.x86_64", product: { name: "kernel-default-devel-5.3.18-24.46.1.x86_64", product_id: "kernel-default-devel-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-5.3.18-24.46.1.x86_64", product: { name: "kernel-default-extra-5.3.18-24.46.1.x86_64", product_id: "kernel-default-extra-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-5.3.18-24.46.1.x86_64", product: { name: "kernel-default-livepatch-5.3.18-24.46.1.x86_64", product_id: "kernel-default-livepatch-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", product: { name: "kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", product_id: "kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-24.46.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-24.46.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-24.46.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-24.46.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.46.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-5.3.18-24.46.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-5_3_18-24_46-preempt-1-5.3.1.x86_64", product: { name: "kernel-livepatch-5_3_18-24_46-preempt-1-5.3.1.x86_64", product_id: "kernel-livepatch-5_3_18-24_46-preempt-1-5.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-24.46.1.x86_64", product: { name: "kernel-obs-build-5.3.18-24.46.1.x86_64", product_id: "kernel-obs-build-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-24.46.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-24.46.1.x86_64", product_id: "kernel-obs-qa-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-24.46.1.x86_64", product: { name: "kernel-preempt-5.3.18-24.46.1.x86_64", product_id: "kernel-preempt-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-24.46.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-24.46.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-extra-5.3.18-24.46.1.x86_64", product: { name: "kernel-preempt-extra-5.3.18-24.46.1.x86_64", product_id: "kernel-preempt-extra-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-livepatch-devel-5.3.18-24.46.1.x86_64", product: { name: "kernel-preempt-livepatch-devel-5.3.18-24.46.1.x86_64", product_id: "kernel-preempt-livepatch-devel-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-24.46.1.x86_64", product: { name: "kernel-syms-5.3.18-24.46.1.x86_64", product_id: "kernel-syms-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-5.3.18-24.46.1.x86_64", product: { name: "kselftests-kmp-default-5.3.18-24.46.1.x86_64", product_id: "kselftests-kmp-default-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-preempt-5.3.18-24.46.1.x86_64", product: { name: "kselftests-kmp-preempt-5.3.18-24.46.1.x86_64", product_id: "kselftests-kmp-preempt-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-5.3.18-24.46.1.x86_64", product: { name: "ocfs2-kmp-default-5.3.18-24.46.1.x86_64", product_id: "ocfs2-kmp-default-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-preempt-5.3.18-24.46.1.x86_64", product: { name: "ocfs2-kmp-preempt-5.3.18-24.46.1.x86_64", product_id: "ocfs2-kmp-preempt-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-5.3.18-24.46.1.x86_64", product: { name: "reiserfs-kmp-default-5.3.18-24.46.1.x86_64", product_id: "reiserfs-kmp-default-5.3.18-24.46.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-preempt-5.3.18-24.46.1.x86_64", product: { name: "reiserfs-kmp-preempt-5.3.18-24.46.1.x86_64", product_id: "reiserfs-kmp-preempt-5.3.18-24.46.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP2", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP2", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP2", product: { name: "SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP2", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", }, product_reference: "kernel-default-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", }, product_reference: "kernel-default-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", }, product_reference: "kernel-default-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-default-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", }, product_reference: "kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", }, product_reference: "kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.46.1.9.19.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", }, product_reference: "kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", }, product_reference: "kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", }, product_reference: "kernel-default-devel-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", }, product_reference: "kernel-default-devel-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", }, product_reference: "kernel-default-devel-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-24.46.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", }, product_reference: "kernel-devel-5.3.18-24.46.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-24.46.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", }, product_reference: "kernel-macros-5.3.18-24.46.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", }, product_reference: "kernel-preempt-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-24.46.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", }, product_reference: "kernel-docs-5.3.18-24.46.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", }, product_reference: "kernel-obs-build-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", }, product_reference: "kernel-obs-build-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", }, product_reference: "kernel-obs-build-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", }, product_reference: "kernel-preempt-devel-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-24.46.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", }, product_reference: "kernel-source-5.3.18-24.46.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", }, product_reference: "kernel-syms-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", }, product_reference: "kernel-syms-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", }, product_reference: "kernel-syms-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-syms-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", }, product_reference: "reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", }, product_reference: "reiserfs-kmp-default-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", }, product_reference: "reiserfs-kmp-default-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", }, product_reference: "kernel-default-livepatch-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", }, product_reference: "kernel-default-livepatch-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-default-livepatch-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", }, product_reference: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", }, product_reference: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2", product_id: "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", }, product_reference: "kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", }, product_reference: "cluster-md-kmp-default-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", }, product_reference: "cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", }, product_reference: "cluster-md-kmp-default-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", }, product_reference: "cluster-md-kmp-default-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", }, product_reference: "dlm-kmp-default-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", }, product_reference: "dlm-kmp-default-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", }, product_reference: "dlm-kmp-default-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", }, product_reference: "dlm-kmp-default-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", }, product_reference: "gfs2-kmp-default-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", }, product_reference: "gfs2-kmp-default-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", }, product_reference: "gfs2-kmp-default-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", }, product_reference: "gfs2-kmp-default-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.46.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", }, product_reference: "ocfs2-kmp-default-5.3.18-24.46.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.46.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", }, product_reference: "ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.46.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", }, product_reference: "ocfs2-kmp-default-5.3.18-24.46.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", }, product_reference: "ocfs2-kmp-default-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-5.3.18-24.46.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", }, product_reference: "kernel-default-extra-5.3.18-24.46.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-27830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27830", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27830", url: "https://www.suse.com/security/cve/CVE-2020-27830", }, { category: "external", summary: "SUSE Bug 1179656 for CVE-2020-27830", url: "https://bugzilla.suse.com/1179656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "moderate", }, ], title: "CVE-2020-27830", }, { cve: "CVE-2020-28374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28374", }, ], notes: [ { category: "general", text: "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28374", url: "https://www.suse.com/security/cve/CVE-2020-28374", }, { category: "external", summary: "SUSE Bug 1178372 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178372", }, { category: "external", summary: "SUSE Bug 1178684 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178684", }, { category: "external", summary: "SUSE Bug 1180676 for CVE-2020-28374", url: "https://bugzilla.suse.com/1180676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-28374", }, { cve: "CVE-2020-29370", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29370", }, ], notes: [ { category: "general", text: "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29370", url: "https://www.suse.com/security/cve/CVE-2020-29370", }, { category: "external", summary: "SUSE Bug 1179435 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179435", }, { category: "external", summary: "SUSE Bug 1179648 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179648", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "moderate", }, ], title: "CVE-2020-29370", }, { cve: "CVE-2020-29373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29373", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29373", url: "https://www.suse.com/security/cve/CVE-2020-29373", }, { category: "external", summary: "SUSE Bug 1179434 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179434", }, { category: "external", summary: "SUSE Bug 1179779 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-29373", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.s390x", "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_46-default-1-5.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.46.1.9.19.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.46.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.46.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.46.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:15:00Z", details: "important", }, ], title: "CVE-2020-36158", }, ], }
suse-su-2021:0098-1
Vulnerability from csaf_suse
Published
2021-01-12 18:18
Modified
2021-01-12 18:18
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20669: Fixed an improper check i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c (bsc#1122971).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#1179663).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
The following non-security bugs were fixed:
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- Avoid a GCC warning about '/*' within a comment.
- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#1050242).
- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: mcp251x: add error check when wq alloc failed (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#1066129).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- EDAC/i10nm: Use readl() to access MMIO registers (12sp5).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- i40iw: Fix error handling in i40iw_manage_arp_cache() (bsc#1111666)
- i40iw: fix null pointer dereference on a null wqe pointer (bsc#1111666)
- i40iw: Report correct firmware version (bsc#1111666)
- IB/cma: Fix ports memory leak in cma_configfs (bsc#1111666)
- IB/hfi1: Call kobject_put() when kobject_init_and_add() fails (bsc#1111666)
- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (bsc#1111666)
- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (bsc#1111666)
- IB/mlx4: Add and improve logging (bsc#1111666)
- IB/mlx4: Add support for MRA (bsc#1111666)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1111666)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1111666)
- IB/mlx4: Test return value of calls to ib_get_cached_pkey (bsc#1111666)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1111666)
- IB/qib: Call kobject_put() when kobject_init_and_add() fails (bsc#1111666)
- IB/rdmavt: Fix sizeof mismatch (bsc#1111666)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1111666)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- igc: Fix returning wrong statistics (bsc#1118657).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- kABI fix for g2d (git-fixes).
- kABI workaround for dsa/b53 changes (git-fixes).
- kABI workaround for net/ipvlan changes (git-fixes).
- kABI workaround for usermodehelper changes (bsc#1179406).
- kABI: ath10k: move a new structure member to the end (git-fixes).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- matroxfb: avoid -Warray-bounds warning (git-fixes).
- md/raid5: fix oops during stripe resizing (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mlxsw: core: Fix memory leak on module removal (bsc#1112374).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- Move upstreamed bt fixes into sorted section
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/tls: Fix kmap usage (bsc#1109837).
- net/tls: missing received data after fast remote close (bsc#1109837).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
- net: aquantia: fix LRO with FCS error (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).
- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).
- net: dsa: b53: Ensure the default VID is untagged (git-fixes).
- net: dsa: b53: Fix default VLAN ID (git-fixes).
- net: dsa: b53: Properly account for VLAN filtering (git-fixes).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).
- net: dsa: qca8k: remove leftover phy accessors (git-fixes).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (git-fixes).
- net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).
- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
- net: macb: add missing barriers when reading descriptors (git-fixes).
- net: macb: fix dropped RX frames due to a race (git-fixes).
- net: macb: fix error format in dev_err() (git-fixes).
- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).
- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#1104389).
- net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).
- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
- net: stmmac: fix csr_clk can't be zero issue (git-fixes).
- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).
- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
- net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#1056787).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nfp: use correct define to return NONE fec (bsc#1109837).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- ocfs2: fix unbalanced locking (bsc#1180506).
- ocfs2: initialize ip_next_orphan (bsc#1179724).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- phy: Revert toggling reset changes (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- ppp: remove the PPPIOCDETACH ioctl (git-fixes).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#1050545).
- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (bsc#1050536 bsc#1050545).
- qed: suppress false-positives interrupt error messages on HW init (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
- RDMA/bnxt_re: Fix lifetimes in bnxt_re_task (bsc#1111666)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1111666)
- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (bsc#1111666)
- RDMA/cm: Fix checking for allowed duplicate listens (bsc#1111666)
- RDMA/cm: Remove a race freeing timewait_info (bsc#1111666)
- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (bsc#1111666)
- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (bsc#1111666)
- RDMA/core: Fix race between destroy and release FD object (bsc#1111666)
- RDMA/core: Prevent mixed use of FDs between shared ufiles (bsc#1111666)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1111666)
- RDMA/hns: Set the unsupported wr opcode (bsc#1111666)
- RDMA/ipoib: Fix ABBA deadlock with ipoib_reap_ah() (bsc#1111666)
- RDMA/ipoib: Return void from ipoib_ib_dev_stop() (bsc#1111666)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1111666)
- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (bsc#1111666)
- RDMA/mlx4: Initialize ib_spec on the stack (bsc#1111666)
- RDMA/mlx4: Read pkey table length instead of hardcoded value (bsc#1111666)
- RDMA/mlx5: Set GRH fields in query QP on RoCE (bsc#1111666)
- RDMA/mlx5: Verify that QP is created with RQ or SQ (bsc#1111666)
- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (bsc#1111666)
- RDMA/qedr: Endianness warnings cleanup (bsc#1111666)
- RDMA/qedr: Fix doorbell setting (bsc#1111666)
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#1050545).
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).
- RDMA/qedr: Fix use of uninitialized field (bsc#1111666)
- RDMA/qedr: SRQ's bug fixes (bsc#1111666)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1111666)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1111666)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1111666)
- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1111666)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1111666)
- RDMA/rxe: Remove useless rxe_init_device_param assignments (bsc#1111666)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1111666)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1111666)
- RDMA/rxe: Set default vendor ID (bsc#1111666)
- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (bsc#1111666)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1111666)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1111666)
- reboot: fix overflow parsing reboot cpu number (bsc#1179421).
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (git-fixes).
- s390/stp: add locking to sysfs functions (git-fixes).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
- scsi: lpfc: Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
- scsi: lpfc: Use generic power management (bsc#1164780).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: Remove unneeded break statements (bsc#1164780).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- splice: only read in as much information as there is pipe buffer space (bsc#1179520).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: add a missing dependency (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1103992).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#1103992).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).
- tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#1109837).
- timer: Fix wheel index calculation on last level (git fixes)
- timer: Prevent base->clk from moving backward (git-fixes)
- tracing: Fix out of bounds write in get_trace_buf (bsc#1179403).
- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).
- usb: serial: digi_acceleport: clean up set_termios (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: digi_acceleport: remove in_interrupt() usage.
- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).
- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).
- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- usermodehelper: reset umask to default before executing user process (bsc#1179406).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1114648).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).
- xfrm: Fix memleak on xfrm state destroy (bsc#1158775).
- xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames
SUSE-2021-98,SUSE-SLE-SERVER-12-SP5-2021-98
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20669: Fixed an improper check i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c (bsc#1122971).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#1179663).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).\n- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- Avoid a GCC warning about '/*' within a comment.\n- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#1050242).\n- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: mcp251x: add error check when wq alloc failed (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- coredump: fix core_pattern parse error (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#1066129).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- EDAC/i10nm: Use readl() to access MMIO registers (12sp5).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).\n- i40iw: Fix error handling in i40iw_manage_arp_cache() (bsc#1111666)\n- i40iw: fix null pointer dereference on a null wqe pointer (bsc#1111666)\n- i40iw: Report correct firmware version (bsc#1111666)\n- IB/cma: Fix ports memory leak in cma_configfs (bsc#1111666)\n- IB/hfi1: Call kobject_put() when kobject_init_and_add() fails (bsc#1111666)\n- IB/hfi1: Fix memory leaks in sysfs registration and unregistration (bsc#1111666)\n- IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (bsc#1111666)\n- IB/mlx4: Add and improve logging (bsc#1111666)\n- IB/mlx4: Add support for MRA (bsc#1111666)\n- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1111666)\n- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1111666)\n- IB/mlx4: Test return value of calls to ib_get_cached_pkey (bsc#1111666)\n- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1111666)\n- IB/qib: Call kobject_put() when kobject_init_and_add() fails (bsc#1111666)\n- IB/rdmavt: Fix sizeof mismatch (bsc#1111666)\n- IB/srpt: Fix memory leak in srpt_add_one (bsc#1111666)\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- igc: Fix returning wrong statistics (bsc#1118657).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).\n- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: trackpoint - add new trackpoint variant IDs (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- kABI fix for g2d (git-fixes).\n- kABI workaround for dsa/b53 changes (git-fixes).\n- kABI workaround for net/ipvlan changes (git-fixes).\n- kABI workaround for usermodehelper changes (bsc#1179406).\n- kABI: ath10k: move a new structure member to the end (git-fixes).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- kgdb: Fix spurious true from in_dbg_master() (git-fixes).\n- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- matroxfb: avoid -Warray-bounds warning (git-fixes).\n- md/raid5: fix oops during stripe resizing (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mlxsw: core: Fix memory leak on module removal (bsc#1112374).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- Move upstreamed bt fixes into sorted section\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/tls: Fix kmap usage (bsc#1109837).\n- net/tls: missing received data after fast remote close (bsc#1109837).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).\n- net: aquantia: fix LRO with FCS error (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).\n- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).\n- net: dsa: b53: Ensure the default VID is untagged (git-fixes).\n- net: dsa: b53: Fix default VLAN ID (git-fixes).\n- net: dsa: b53: Properly account for VLAN filtering (git-fixes).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).\n- net: dsa: qca8k: remove leftover phy accessors (git-fixes).\n- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).\n- net: ena: handle bad request id in ena_netdev (git-fixes).\n- net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).\n- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).\n- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).\n- net: macb: add missing barriers when reading descriptors (git-fixes).\n- net: macb: fix dropped RX frames due to a race (git-fixes).\n- net: macb: fix error format in dev_err() (git-fixes).\n- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).\n- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).\n- net: qed: fix 'maybe uninitialized' warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#1104389).\n- net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).\n- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).\n- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).\n- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).\n- net: stmmac: fix csr_clk can't be zero issue (git-fixes).\n- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).\n- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).\n- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).\n- net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#1056787).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nfp: use correct define to return NONE fec (bsc#1109837).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- ocfs2: initialize ip_next_orphan (bsc#1179724).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- phy: Revert toggling reset changes (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- ppp: remove the PPPIOCDETACH ioctl (git-fixes).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#1050545).\n- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (bsc#1050536 bsc#1050545).\n- qed: suppress false-positives interrupt error messages on HW init (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).\n- RDMA/bnxt_re: Fix lifetimes in bnxt_re_task (bsc#1111666)\n- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1111666)\n- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (bsc#1111666)\n- RDMA/cm: Fix checking for allowed duplicate listens (bsc#1111666)\n- RDMA/cm: Remove a race freeing timewait_info (bsc#1111666)\n- RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (bsc#1111666)\n- RDMA/cma: Protect bind_list and listen_list while finding matching cm id (bsc#1111666)\n- RDMA/core: Fix race between destroy and release FD object (bsc#1111666)\n- RDMA/core: Prevent mixed use of FDs between shared ufiles (bsc#1111666)\n- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1111666)\n- RDMA/hns: Set the unsupported wr opcode (bsc#1111666)\n- RDMA/ipoib: Fix ABBA deadlock with ipoib_reap_ah() (bsc#1111666)\n- RDMA/ipoib: Return void from ipoib_ib_dev_stop() (bsc#1111666)\n- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1111666)\n- RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (bsc#1111666)\n- RDMA/mlx4: Initialize ib_spec on the stack (bsc#1111666)\n- RDMA/mlx4: Read pkey table length instead of hardcoded value (bsc#1111666)\n- RDMA/mlx5: Set GRH fields in query QP on RoCE (bsc#1111666)\n- RDMA/mlx5: Verify that QP is created with RQ or SQ (bsc#1111666)\n- RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (bsc#1111666)\n- RDMA/qedr: Endianness warnings cleanup (bsc#1111666)\n- RDMA/qedr: Fix doorbell setting (bsc#1111666)\n- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#1050545).\n- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).\n- RDMA/qedr: Fix use of uninitialized field (bsc#1111666)\n- RDMA/qedr: SRQ's bug fixes (bsc#1111666)\n- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1111666)\n- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1111666)\n- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1111666)\n- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1111666)\n- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1111666)\n- RDMA/rxe: Remove useless rxe_init_device_param assignments (bsc#1111666)\n- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1111666)\n- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1111666)\n- RDMA/rxe: Set default vendor ID (bsc#1111666)\n- RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (bsc#1111666)\n- RDMA/rxe: Skip dgid check in loopback mode (bsc#1111666)\n- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1111666)\n- reboot: fix overflow parsing reboot cpu number (bsc#1179421).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- s390/bpf: Fix multiple tail calls (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).\n- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (git-fixes).\n- s390/stp: add locking to sysfs functions (git-fixes).\n- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).\n- scsi: lpfc: Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).\n- scsi: lpfc: Use generic power management (bsc#1164780).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: Remove unneeded break statements (bsc#1164780).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).\n- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).\n- SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- splice: only read in as much information as there is pipe buffer space (bsc#1179520).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: add a missing dependency (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1103992).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).\n- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#1103992).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).\n- tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#1109837).\n- timer: Fix wheel index calculation on last level (git fixes)\n- timer: Prevent base->clk from moving backward (git-fixes)\n- tracing: Fix out of bounds write in get_trace_buf (bsc#1179403).\n- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).\n- usb: serial: digi_acceleport: clean up set_termios (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: digi_acceleport: remove in_interrupt() usage.\n- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).\n- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).\n- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: kl5kusb105: fix memleak on open (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: serial: option: fix Quectel BG96 matching (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- usermodehelper: reset umask to default before executing user process (bsc#1179406).\n- wimax: fix duplicate initializer warning (git-fixes).\n- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).\n- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1114648).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).\n- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).\n- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).\n- xfrm: Fix memleak on xfrm state destroy (bsc#1158775).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-98,SUSE-SLE-SERVER-12-SP5-2021-98", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0098-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0098-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210098-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0098-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008184.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1050242", url: "https://bugzilla.suse.com/1050242", }, { category: "self", summary: "SUSE Bug 1050536", url: "https://bugzilla.suse.com/1050536", }, { category: "self", summary: "SUSE Bug 1050545", url: "https://bugzilla.suse.com/1050545", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1056653", url: "https://bugzilla.suse.com/1056653", }, { category: "self", summary: "SUSE Bug 1056657", url: "https://bugzilla.suse.com/1056657", }, { category: "self", summary: "SUSE Bug 1056787", url: "https://bugzilla.suse.com/1056787", }, { category: "self", summary: "SUSE Bug 1064802", url: "https://bugzilla.suse.com/1064802", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066129", url: "https://bugzilla.suse.com/1066129", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103992", url: "https://bugzilla.suse.com/1103992", }, { category: "self", summary: "SUSE Bug 1104389", url: "https://bugzilla.suse.com/1104389", }, { category: "self", summary: "SUSE Bug 1104393", url: "https://bugzilla.suse.com/1104393", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1110096", url: "https://bugzilla.suse.com/1110096", }, { category: "self", summary: "SUSE Bug 1111666", url: "https://bugzilla.suse.com/1111666", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1118657", url: "https://bugzilla.suse.com/1118657", }, { category: "self", summary: "SUSE Bug 1122971", url: "https://bugzilla.suse.com/1122971", }, { category: "self", summary: "SUSE Bug 1136460", url: "https://bugzilla.suse.com/1136460", }, { category: "self", summary: "SUSE Bug 1136461", url: "https://bugzilla.suse.com/1136461", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1158775", url: "https://bugzilla.suse.com/1158775", }, { category: "self", summary: "SUSE Bug 1164780", url: "https://bugzilla.suse.com/1164780", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1172538", url: "https://bugzilla.suse.com/1172538", }, { category: "self", summary: "SUSE Bug 1172694", url: "https://bugzilla.suse.com/1172694", }, { category: "self", summary: "SUSE Bug 1174784", url: "https://bugzilla.suse.com/1174784", }, { category: "self", summary: "SUSE Bug 1174852", url: "https://bugzilla.suse.com/1174852", }, { category: "self", summary: "SUSE Bug 1176558", url: "https://bugzilla.suse.com/1176558", }, { category: "self", summary: "SUSE Bug 1176559", url: "https://bugzilla.suse.com/1176559", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179141", url: "https://bugzilla.suse.com/1179141", }, { category: "self", summary: "SUSE Bug 1179142", url: "https://bugzilla.suse.com/1179142", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179403", url: "https://bugzilla.suse.com/1179403", }, { category: "self", summary: "SUSE Bug 1179406", url: "https://bugzilla.suse.com/1179406", }, { category: "self", summary: "SUSE Bug 1179418", url: "https://bugzilla.suse.com/1179418", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179421", url: "https://bugzilla.suse.com/1179421", }, { category: "self", summary: "SUSE Bug 1179429", url: "https://bugzilla.suse.com/1179429", }, { category: "self", summary: "SUSE Bug 1179444", url: "https://bugzilla.suse.com/1179444", }, { category: "self", summary: "SUSE Bug 1179520", url: "https://bugzilla.suse.com/1179520", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179616", url: "https://bugzilla.suse.com/1179616", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179666", url: "https://bugzilla.suse.com/1179666", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1179724", url: "https://bugzilla.suse.com/1179724", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179810", url: "https://bugzilla.suse.com/1179810", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180028", url: "https://bugzilla.suse.com/1180028", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180030", url: "https://bugzilla.suse.com/1180030", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180032", url: "https://bugzilla.suse.com/1180032", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE CVE CVE-2018-20669 page", url: "https://www.suse.com/security/cve/CVE-2018-20669/", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-15436 page", url: "https://www.suse.com/security/cve/CVE-2020-15436/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-29371 page", url: "https://www.suse.com/security/cve/CVE-2020-29371/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-12T18:18:15Z", generator: { date: "2021-01-12T18:18:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0098-1", initial_release_date: "2021-01-12T18:18:15Z", revision_history: [ { date: "2021-01-12T18:18:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-4.12.14-16.41.1.noarch", product: { name: "kernel-devel-azure-4.12.14-16.41.1.noarch", product_id: "kernel-devel-azure-4.12.14-16.41.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-4.12.14-16.41.1.noarch", product: { name: "kernel-source-azure-4.12.14-16.41.1.noarch", product_id: "kernel-source-azure-4.12.14-16.41.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-4.12.14-16.41.1.x86_64", product: { name: "cluster-md-kmp-azure-4.12.14-16.41.1.x86_64", product_id: "cluster-md-kmp-azure-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-4.12.14-16.41.1.x86_64", product: { name: "dlm-kmp-azure-4.12.14-16.41.1.x86_64", product_id: "dlm-kmp-azure-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-4.12.14-16.41.1.x86_64", product: { name: "gfs2-kmp-azure-4.12.14-16.41.1.x86_64", product_id: "gfs2-kmp-azure-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-4.12.14-16.41.1.x86_64", product: { name: "kernel-azure-4.12.14-16.41.1.x86_64", product_id: "kernel-azure-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-base-4.12.14-16.41.1.x86_64", product: { name: "kernel-azure-base-4.12.14-16.41.1.x86_64", product_id: "kernel-azure-base-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-4.12.14-16.41.1.x86_64", product: { name: "kernel-azure-devel-4.12.14-16.41.1.x86_64", product_id: "kernel-azure-devel-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-4.12.14-16.41.1.x86_64", product: { name: "kernel-azure-extra-4.12.14-16.41.1.x86_64", product_id: "kernel-azure-extra-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-kgraft-devel-4.12.14-16.41.1.x86_64", product: { name: "kernel-azure-kgraft-devel-4.12.14-16.41.1.x86_64", product_id: "kernel-azure-kgraft-devel-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-4.12.14-16.41.1.x86_64", product: { name: "kernel-syms-azure-4.12.14-16.41.1.x86_64", product_id: "kernel-syms-azure-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-4.12.14-16.41.1.x86_64", product: { name: "kselftests-kmp-azure-4.12.14-16.41.1.x86_64", product_id: "kselftests-kmp-azure-4.12.14-16.41.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-4.12.14-16.41.1.x86_64", product: { name: "ocfs2-kmp-azure-4.12.14-16.41.1.x86_64", product_id: "ocfs2-kmp-azure-4.12.14-16.41.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-16.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", }, product_reference: "kernel-azure-4.12.14-16.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-16.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-16.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-16.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-16.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-16.41.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-16.41.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-16.41.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-16.41.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-16.41.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-16.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-4.12.14-16.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", }, product_reference: "kernel-azure-4.12.14-16.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-base-4.12.14-16.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", }, product_reference: "kernel-azure-base-4.12.14-16.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-4.12.14-16.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", }, product_reference: "kernel-azure-devel-4.12.14-16.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-4.12.14-16.41.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", }, product_reference: "kernel-devel-azure-4.12.14-16.41.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-4.12.14-16.41.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", }, product_reference: "kernel-source-azure-4.12.14-16.41.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-4.12.14-16.41.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", }, product_reference: "kernel-syms-azure-4.12.14-16.41.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20669", }, ], notes: [ { category: "general", text: "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20669", url: "https://www.suse.com/security/cve/CVE-2018-20669", }, { category: "external", summary: "SUSE Bug 1122971 for CVE-2018-20669", url: "https://bugzilla.suse.com/1122971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "important", }, ], title: "CVE-2018-20669", }, { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-15436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15436", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15436", url: "https://www.suse.com/security/cve/CVE-2020-15436", }, { category: "external", summary: "SUSE Bug 1179141 for CVE-2020-15436", url: "https://bugzilla.suse.com/1179141", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "moderate", }, ], title: "CVE-2020-15436", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-29371", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29371", }, ], notes: [ { category: "general", text: "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29371", url: "https://www.suse.com/security/cve/CVE-2020-29371", }, { category: "external", summary: "SUSE Bug 1179429 for CVE-2020-29371", url: "https://bugzilla.suse.com/1179429", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "low", }, ], title: "CVE-2020-29371", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.41.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.41.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.41.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:18:15Z", details: "moderate", }, ], title: "CVE-2020-4788", }, ], }
suse-su-2021:0108-1
Vulnerability from csaf_suse
Published
2021-01-13 08:53
Modified
2021-01-13 08:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
The following non-security bugs were fixed:
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- add reference to CVE and its bsc
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- Documentation: seqlock: s/LOCKTYPE/LOCKNAME/g (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: * context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: * context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: * context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: * context fixes * adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: * context fixes * adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: * context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: * context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: * context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: * context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: * changed filename from vkms_composer.c to vkms_crc.c * context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: * context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: * context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: * context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio: hrtimer-trigger: Mark hrtimer to expire in hard interrupt context (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head->lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns->head->lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl->sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address & portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- seqlock: avoid -Wshadow warnings (git-fixes).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- timers: Do not block on ->expiry_lock for TIMER_IRQSAFE timers (bsc#1180349).
- tty: Fix ->session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
Patchnames
SUSE-2021-108,SUSE-SLE-Module-RT-15-SP2-2021-108
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP2 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).\n- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- add reference to CVE and its bsc\n- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).\n- ALSA: core: memalloc: add page alignment for iram (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).\n- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).\n- ALSA: hda/proc - print DP-MST connections (git-fixes).\n- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).\n- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).\n- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).\n- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).\n- ALSA: seq: remove useless function (git-fixes).\n- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).\n- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).\n- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).\n- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).\n- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).\n- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).\n- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).\n- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).\n- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).\n- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).\n- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).\n- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).\n- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).\n- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).\n- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).\n- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).\n- ALSA: usb-audio: Drop debug.h (bsc#1178203).\n- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).\n- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).\n- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).\n- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).\n- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).\n- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).\n- ALSA: usb-audio: Improve some debug prints (bsc#1178203).\n- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).\n- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).\n- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).\n- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).\n- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).\n- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).\n- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).\n- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).\n- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).\n- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).\n- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).\n- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).\n- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).\n- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).\n- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).\n- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).\n- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).\n- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).\n- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).\n- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: meson: fix COMPILE_TEST error (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).\n- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).\n- ASoC: tegra20-spdif: remove 'default m' (git-fixes).\n- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).\n- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).\n- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).\n- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).\n- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).\n- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).\n- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).\n- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).\n- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).\n- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: do not share tcons with DFS (bsc#1178270).\n- cifs: document and cleanup dfs mount (bsc#1178270).\n- cifs: ensure correct super block for DFS reconnect (bsc#1178270).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).\n- cifs: fix double free error on share and prefix (bsc#1178270).\n- cifs: fix leaked reference on requeued write (bsc#1178270).\n- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).\n- cifs: rename reconn_inval_dfs_target() (bsc#1178270).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).\n- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).\n- clk: ingenic: Fix divider calculation with div tables (git-fixes).\n- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Do not return 0 on failure (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).\n- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).\n- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).\n- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).\n- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).\n- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).\n- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).\n- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).\n- Documentation: seqlock: s/LOCKTYPE/LOCKNAME/g (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)\n- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: \t* context fixes\n- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)\n- drm/gma500: fix error check (bsc#1152472) Backporting changes: \t* context fixes\n- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: \t* context fixes\n- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: \t* context fixes \t* adapted I/O functions to old driver\n- drm/imx: tve remove extraneous type qualifier (bsc#1152489)\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)\n- drm/mediatek: Add missing put_device() call in (bsc#1152472)\n- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: \t* context fixes \t* adapted to function layout\n- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)\n- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: \t* context fixes\n- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)\n- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: \t* context fixes\n- drm/radeon: Prefer lower feedback dividers (bsc#1152489)\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)\n- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)\n- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: \t* context fixes\n- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: \t* context fixes\n- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: \t* changed filename from vkms_composer.c to vkms_crc.c \t* context fixes\n- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: \t* context fixes\n- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: \t* context fixes\n- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)\n- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: \t* context fixes\n- drm: rcar-du: Put reference to VSP device (bsc#1152489)\n- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).\n- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).\n- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fail_function: Remove a redundant mutex unlock (bsc#1149032).\n- fbcon: Remove the superfluous break (bsc#1152472)\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- fs/minix: check return value of sb_getblk() (bsc#1179676).\n- fs/minix: do not allow getting deleted inodes (bsc#1179677).\n- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).\n- fs/minix: reject too-large maximum file size (bsc#1179678).\n- fs/minix: remove expected error message in block_to_path() (bsc#1179681).\n- fs/minix: set s_maxbytes correctly (bsc#1179679).\n- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).\n- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).\n- HMAT: Register memory-side cache after parsing (bsc#1178660).\n- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)\n- IB/mlx4: Add and improve logging (bsc#1152489)\n- IB/mlx4: Add support for MRA (bsc#1152489)\n- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)\n- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)\n- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)\n- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)\n- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)\n- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio: hrtimer-trigger: Mark hrtimer to expire in hard interrupt context (git-fixes).\n- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).\n- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- iomap: Clear page error before beginning a write (bsc#1179683).\n- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).\n- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).\n- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: hook up missing RX handlers (git-fixes).\n- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).\n- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).\n- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).\n- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: imx214: Fix stop streaming (git-fixes).\n- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).\n- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).\n- media: ipu3-cio2: Return actual subdev format (git-fixes).\n- media: ipu3-cio2: Serialise access to pad format (git-fixes).\n- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).\n- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: tm6000: Fix sizeof() mismatches (git-fixes).\n- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).\n- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).\n- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).\n- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).\n- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).\n- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).\n- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).\n- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).\n- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).\n- mtd: spinand: Fix OOB read (git-fixes).\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nvme-fabrics: allow to queue requests for live queues (git-fixes).\n- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).\n- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).\n- nvme-fc: cancel async events before freeing event struct (git-fixes).\n- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).\n- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).\n- nvme-fc: fix io timeout to abort I/O (bsc#1177326).\n- nvme-fc: remove err_work work item (bsc#1177326).\n- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).\n- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).\n- nvme-fc: track error_recovery while connecting (bsc#1177326).\n- nvme-fc: wait for queues to freeze before calling (git-fixes).\n- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).\n- nvme-multipath: fix deadlock due to head->lock (git-fixes).\n- nvme-pci: properly print controller address (git-fixes).\n- nvme-rdma: avoid race between time out and tear down (bsc#1179519).\n- nvme-rdma: avoid repeated request completion (bsc#1179519).\n- nvme-rdma: cancel async events before freeing event struct (git-fixes).\n- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).\n- nvme-rdma: fix timeout handler (bsc#1179519).\n- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).\n- nvme-rdma: serialize controller teardown sequences (bsc#1179519).\n- nvme-tcp: avoid race between time out and tear down (bsc#1179519).\n- nvme-tcp: avoid repeated request completion (bsc#1179519).\n- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).\n- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).\n- nvme-tcp: cancel async events before freeing event struct (git-fixes).\n- nvme-tcp: do not poll a non-live queue (bsc#1179519).\n- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).\n- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).\n- nvme-tcp: fix possible leakage during error flow (git-fixes).\n- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).\n- nvme-tcp: fix timeout handler (bsc#1179519).\n- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).\n- nvme-tcp: leverage request plugging (bsc#1179519).\n- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).\n- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).\n- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).\n- nvme-tcp: serialize controller teardown sequences (bsc#1179519).\n- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).\n- nvme-tcp: try to send request in queue_rq context (bsc#1179519).\n- nvme-tcp: use bh_lock in data_ready (bsc#1179519).\n- nvme: do not protect ns mutation with ns->head->lock (git-fixes).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).\n- nvme: introduce nvme_sync_io_queues (bsc#1179519).\n- nvme: Revert: Fix controller creation races with teardown (git-fixes).\n- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).\n- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).\n- PCI: Fix overflow in command-line resource alignment requests (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- PCI: iproc: Fix out-of-bound array accesses (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).\n- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).\n- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).\n- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).\n- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- pwm: zx: Add missing cleanup in error path (git-fixes).\n- qede: Notify qedr when mtu has changed (bsc#1152489)\n- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)\n- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)\n- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)\n- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)\n- RDMA/core: Fix reported speed and width (bsc#1152489)\n- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)\n- RDMA/core: Free DIM memory in error unwind (bsc#1152489)\n- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)\n- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)\n- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)\n- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)\n- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)\n- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)\n- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)\n- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)\n- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)\n- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)\n- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)\n- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)\n- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)\n- RDMA/qedr: Fix doorbell setting (bsc#1152489)\n- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)\n- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)\n- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)\n- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)\n- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)\n- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)\n- RDMA/qedr: SRQ's bug fixes (bsc#1152489)\n- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)\n- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)\n- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)\n- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)\n- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)\n- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489)\n- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)\n- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)\n- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)\n- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)\n- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)\n- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)\n- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)\n- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).\n- regulator: mcp16502: add linear_min_sel (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).\n- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).\n- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).\n- rsi: fix error return code in rsi_reset_card() (git-fixes).\n- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: delay draining the TX buffers (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).\n- s390: add 3f program exception handler (git-fixes).\n- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).\n- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).\n- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)\n- sched/fair: Fix race between runtime distribution and (git-fixes)\n- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)\n- sched/fair: Refill bandwidth before scaling (git-fixes)\n- sched: correct SD_flags returned by tl->sd_flags() (git-fixes)\n- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).\n- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).\n- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).\n- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).\n- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).\n- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).\n- scsi: fnic: Validate io_req before others (bsc#1175079).\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Get device objects using sas_address & portID (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).\n- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).\n- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).\n- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).\n- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).\n- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).\n- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).\n- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).\n- seqlock: avoid -Wshadow warnings (git-fixes).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).\n- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: geni: More properly switch to DMA mode (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- speakup: fix uninitialized flush_lock (git-fixes).\n- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).\n- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: fix resource leak for drivers without .remove callback (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: mt7621: Disable clock in probe error path (git-fixes).\n- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).\n- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).\n- spi: synquacer: Disable clock in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- timers: Do not block on ->expiry_lock for TIMER_IRQSAFE timers (bsc#1180349).\n- tty: Fix ->session locking (bsc#1179745).\n- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).\n- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).\n- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).\n- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).\n- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).\n- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).\n- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).\n- udf: Fix memory leak when mounting (bsc#1179712).\n- usb/max3421: fix return error code in max3421_probe() (git-fixes).\n- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).\n- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: UAS: introduce a quirk to set no_write_same (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)\n- video: fbdev: sis: fix null ptr dereference (bsc#1152472)\n- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: Fix potential dereferencing of null pointer (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).\n- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).\n- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).\n- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).\n- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).\n- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).\n- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).\n- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).\n- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-108,SUSE-SLE-Module-RT-15-SP2-2021-108", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0108-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0108-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210108-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0108-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008191.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1149032", url: "https://bugzilla.suse.com/1149032", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1156315", url: "https://bugzilla.suse.com/1156315", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1165933", url: "https://bugzilla.suse.com/1165933", }, { category: "self", summary: "SUSE Bug 1167657", url: "https://bugzilla.suse.com/1167657", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1171000", url: "https://bugzilla.suse.com/1171000", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1171688", url: "https://bugzilla.suse.com/1171688", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172733", url: "https://bugzilla.suse.com/1172733", }, { category: "self", summary: "SUSE Bug 1174486", url: "https://bugzilla.suse.com/1174486", }, { category: "self", summary: "SUSE Bug 1175079", url: "https://bugzilla.suse.com/1175079", }, { category: "self", summary: "SUSE Bug 1175480", url: "https://bugzilla.suse.com/1175480", }, { category: "self", summary: "SUSE Bug 1176396", url: "https://bugzilla.suse.com/1176396", }, { category: "self", summary: "SUSE Bug 1176942", url: "https://bugzilla.suse.com/1176942", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177500", url: "https://bugzilla.suse.com/1177500", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1177679", url: "https://bugzilla.suse.com/1177679", }, { category: "self", summary: "SUSE Bug 1177733", url: "https://bugzilla.suse.com/1177733", }, { category: "self", summary: "SUSE Bug 1178049", url: "https://bugzilla.suse.com/1178049", }, { category: "self", summary: "SUSE Bug 1178203", url: "https://bugzilla.suse.com/1178203", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178612", url: "https://bugzilla.suse.com/1178612", }, { category: "self", summary: "SUSE Bug 1178660", url: "https://bugzilla.suse.com/1178660", }, { category: "self", summary: "SUSE Bug 1178780", url: "https://bugzilla.suse.com/1178780", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179434", url: "https://bugzilla.suse.com/1179434", }, { category: "self", summary: "SUSE Bug 1179435", url: "https://bugzilla.suse.com/1179435", }, { category: "self", summary: "SUSE Bug 1179519", url: "https://bugzilla.suse.com/1179519", }, { category: "self", summary: "SUSE Bug 1179575", url: "https://bugzilla.suse.com/1179575", }, { category: "self", summary: "SUSE Bug 1179604", url: "https://bugzilla.suse.com/1179604", }, { category: "self", summary: "SUSE Bug 1179652", url: "https://bugzilla.suse.com/1179652", }, { category: "self", summary: "SUSE Bug 1179656", url: "https://bugzilla.suse.com/1179656", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179675", url: "https://bugzilla.suse.com/1179675", }, { category: "self", summary: "SUSE Bug 1179676", url: "https://bugzilla.suse.com/1179676", }, { category: "self", summary: "SUSE Bug 1179677", url: "https://bugzilla.suse.com/1179677", }, { category: "self", summary: "SUSE Bug 1179678", url: "https://bugzilla.suse.com/1179678", }, { category: "self", summary: "SUSE Bug 1179679", url: "https://bugzilla.suse.com/1179679", }, { category: "self", summary: "SUSE Bug 1179680", url: "https://bugzilla.suse.com/1179680", }, { category: "self", summary: "SUSE Bug 1179681", url: "https://bugzilla.suse.com/1179681", }, { category: "self", summary: "SUSE Bug 1179682", url: "https://bugzilla.suse.com/1179682", }, { category: "self", summary: "SUSE Bug 1179683", url: "https://bugzilla.suse.com/1179683", }, { category: "self", summary: "SUSE Bug 1179684", url: "https://bugzilla.suse.com/1179684", }, { category: "self", summary: "SUSE Bug 1179685", url: "https://bugzilla.suse.com/1179685", }, { category: "self", summary: "SUSE Bug 1179687", url: "https://bugzilla.suse.com/1179687", }, { category: "self", summary: "SUSE Bug 1179688", url: "https://bugzilla.suse.com/1179688", }, { category: "self", summary: "SUSE Bug 1179689", url: "https://bugzilla.suse.com/1179689", }, { category: "self", summary: "SUSE Bug 1179690", url: "https://bugzilla.suse.com/1179690", }, { category: "self", summary: "SUSE Bug 1179703", url: "https://bugzilla.suse.com/1179703", }, { category: "self", summary: "SUSE Bug 1179704", url: "https://bugzilla.suse.com/1179704", }, { category: "self", summary: "SUSE Bug 1179707", url: "https://bugzilla.suse.com/1179707", }, { category: "self", summary: "SUSE Bug 1179709", url: "https://bugzilla.suse.com/1179709", }, { category: "self", summary: "SUSE Bug 1179710", url: "https://bugzilla.suse.com/1179710", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179712", url: "https://bugzilla.suse.com/1179712", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179763", url: "https://bugzilla.suse.com/1179763", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179892", url: "https://bugzilla.suse.com/1179892", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180056", url: "https://bugzilla.suse.com/1180056", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180261", url: "https://bugzilla.suse.com/1180261", }, { category: "self", summary: "SUSE Bug 1180349", url: "https://bugzilla.suse.com/1180349", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE Bug 1180541", url: "https://bugzilla.suse.com/1180541", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180566", url: "https://bugzilla.suse.com/1180566", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-27830 page", url: "https://www.suse.com/security/cve/CVE-2020-27830/", }, { category: "self", summary: "SUSE CVE CVE-2020-29370 page", url: "https://www.suse.com/security/cve/CVE-2020-29370/", }, { category: "self", summary: "SUSE CVE CVE-2020-29373 page", url: "https://www.suse.com/security/cve/CVE-2020-29373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-13T08:53:33Z", generator: { date: "2021-01-13T08:53:33Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0108-1", initial_release_date: "2021-01-13T08:53:33Z", revision_history: [ { date: "2021-01-13T08:53:33Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-22.1.noarch", product: { name: "kernel-devel-rt-5.3.18-22.1.noarch", product_id: "kernel-devel-rt-5.3.18-22.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-22.1.noarch", product: { name: "kernel-source-rt-5.3.18-22.1.noarch", product_id: "kernel-source-rt-5.3.18-22.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-22.1.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-22.1.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-22.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-22.1.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-22.1.x86_64", product: { name: "dlm-kmp-rt-5.3.18-22.1.x86_64", product_id: "dlm-kmp-rt-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-22.1.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-22.1.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-22.1.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-22.1.x86_64", product_id: "gfs2-kmp-rt-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-22.1.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-22.1.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-22.1.x86_64", product: { name: "kernel-rt-5.3.18-22.1.x86_64", product_id: "kernel-rt-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-22.1.x86_64", product: { name: "kernel-rt-devel-5.3.18-22.1.x86_64", product_id: "kernel-rt-devel-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-22.1.x86_64", product: { name: "kernel-rt-extra-5.3.18-22.1.x86_64", product_id: "kernel-rt-extra-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-5.3.18-22.1.x86_64", product: { name: "kernel-rt-livepatch-devel-5.3.18-22.1.x86_64", product_id: "kernel-rt-livepatch-devel-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-22.1.x86_64", product: { name: "kernel-rt_debug-5.3.18-22.1.x86_64", product_id: "kernel-rt_debug-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-22.1.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-22.1.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-22.1.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-22.1.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-5.3.18-22.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-5.3.18-22.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-22.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-22.1.x86_64", product_id: "kernel-syms-rt-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-22.1.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-22.1.x86_64", product_id: "kselftests-kmp-rt-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-22.1.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-22.1.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-22.1.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-22.1.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-22.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-22.1.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-22.1.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-22.1.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-22.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-22.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-22.1.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-22.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Real Time Module 15 SP2", product: { name: "SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.3.18-22.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.3.18-22.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.3.18-22.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", }, product_reference: "dlm-kmp-rt-5.3.18-22.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.3.18-22.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.3.18-22.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.3.18-22.1.noarch as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", }, product_reference: "kernel-devel-rt-5.3.18-22.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-22.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", }, product_reference: "kernel-rt-5.3.18-22.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.3.18-22.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", }, product_reference: "kernel-rt-devel-5.3.18-22.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.3.18-22.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.3.18-22.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.3.18-22.1.noarch as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", }, product_reference: "kernel-source-rt-5.3.18-22.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.3.18-22.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", }, product_reference: "kernel-syms-rt-5.3.18-22.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.3.18-22.1.x86_64 as component of SUSE Real Time Module 15 SP2", product_id: "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.3.18-22.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-27830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27830", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27830", url: "https://www.suse.com/security/cve/CVE-2020-27830", }, { category: "external", summary: "SUSE Bug 1179656 for CVE-2020-27830", url: "https://bugzilla.suse.com/1179656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "moderate", }, ], title: "CVE-2020-27830", }, { cve: "CVE-2020-29370", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29370", }, ], notes: [ { category: "general", text: "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29370", url: "https://www.suse.com/security/cve/CVE-2020-29370", }, { category: "external", summary: "SUSE Bug 1179435 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179435", }, { category: "external", summary: "SUSE Bug 1179648 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179648", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "moderate", }, ], title: "CVE-2020-29370", }, { cve: "CVE-2020-29373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29373", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29373", url: "https://www.suse.com/security/cve/CVE-2020-29373", }, { category: "external", summary: "SUSE Bug 1179434 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179434", }, { category: "external", summary: "SUSE Bug 1179779 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "important", }, ], title: "CVE-2020-29373", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-22.1.noarch", "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-22.1.x86_64", "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-22.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-13T08:53:33Z", details: "important", }, ], title: "CVE-2020-36158", }, ], }
suse-su-2021:0437-1
Vulnerability from csaf_suse
Published
2021-02-11 15:33
Modified
2021-02-11 15:33
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).
- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() which could eventually have allowed attackers to cause a denial of service (memory consumption) (bnc#1157298 ).
- CVE-2019-6133: Fixed an issue where the 'start time' protection mechanism could have been bypassed and therefore authorization decisions are improperly cached (bsc#1128172).
The following non-security bugs were fixed:
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).
- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).
- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).
- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).
- futex: Avoid freeing an active timer (bsc#969755).
- futex: Avoid violating the 10th rule of futex (bsc#969755).
- futex: Change locking rules (bsc#969755).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).
- futex: Drop hb->lock before enqueueing on the rtmutex (bsc#969755).
- futex: Fix OWNER_DEAD fixup (bsc#969755).
- futex: Fix incorrect should_fail_futex() handling (bsc#969755).
- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).
- futex: Fix pi_state->owner serialization (bsc#969755).
- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).
- futex: Futex_unlock_pi() determinism (bsc#969755).
- futex: Handle early deadlock return correctly (bsc#969755).
- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).
- futex: Pull rt_mutex_futex_unlock() out from under hb->lock (bsc#969755).
- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).
- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
Patchnames
SUSE-2021-437,SUSE-OpenStack-Cloud-7-2021-437,SUSE-SLE-HA-12-SP2-2021-437,SUSE-SLE-SAP-12-SP2-2021-437,SUSE-SLE-SERVER-12-SP2-2021-437,SUSE-SLE-SERVER-12-SP2-BCL-2021-437
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-25211: Fixed a flaw where a local attacker was able to inject conntrack netlink configuration that could cause a denial of service or trigger the use of incorrect protocol numbers in ctnetlink_parse_tuple_filter (bnc#1176395).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).\n- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-25285: A race condition between hugetlb sysctl handlers in mm/hugetlb.c could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact (bnc#1176485 ).\n- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service (bsc#1179140).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2020-25668: Fixed a use-after-free in con_font_op() (bsc#1178123).\n- CVE-2020-27673: Fixed an issue where rogue guests could have caused denial of service of Dom0 via high frequency events (XSA-332 bsc#1177411)\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).\n- CVE-2019-19063: Fixed two memory leaks in the rtl_usb_probe() which could eventually have allowed attackers to cause a denial of service (memory consumption) (bnc#1157298 ).\n- CVE-2019-6133: Fixed an issue where the 'start time' protection mechanism could have been bypassed and therefore authorization decisions are improperly cached (bsc#1128172).\n\nThe following non-security bugs were fixed:\n\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- futex,rt_mutex: Fix rt_mutex_cleanup_proxy_lock() (bsc#969755).\n- futex,rt_mutex: Introduce rt_mutex_init_waiter() (bsc#969755).\n- futex,rt_mutex: Provide futex specific rt_mutex API (bsc#969755).\n- futex,rt_mutex: Restructure rt_mutex_finish_proxy_lock() (bsc#969755).\n- futex: Avoid freeing an active timer (bsc#969755).\n- futex: Avoid violating the 10th rule of futex (bsc#969755).\n- futex: Change locking rules (bsc#969755).\n- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#969755).\n- futex: Drop hb->lock before enqueueing on the rtmutex (bsc#969755).\n- futex: Fix OWNER_DEAD fixup (bsc#969755).\n- futex: Fix incorrect should_fail_futex() handling (bsc#969755).\n- futex: Fix more put_pi_state() vs. exit_pi_state_list() races (bsc#969755).\n- futex: Fix pi_state->owner serialization (bsc#969755).\n- futex: Fix small (and harmless looking) inconsistencies (bsc#969755).\n- futex: Futex_unlock_pi() determinism (bsc#969755).\n- futex: Handle early deadlock return correctly (bsc#969755).\n- futex: Handle transient 'ownerless' rtmutex state correctly (bsc#969755).\n- futex: Pull rt_mutex_futex_unlock() out from under hb->lock (bsc#969755).\n- futex: Rework futex_lock_pi() to use rt_mutex_*_proxy_lock() (bsc#969755).\n- futex: Rework inconsistent rt_mutex/futex_q state (bsc#969755).\n- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#969755).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-437,SUSE-OpenStack-Cloud-7-2021-437,SUSE-SLE-HA-12-SP2-2021-437,SUSE-SLE-SAP-12-SP2-2021-437,SUSE-SLE-SERVER-12-SP2-2021-437,SUSE-SLE-SERVER-12-SP2-BCL-2021-437", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0437-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0437-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210437-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0437-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008312.html", }, { category: "self", summary: "SUSE Bug 1070943", url: "https://bugzilla.suse.com/1070943", }, { category: "self", summary: "SUSE Bug 1121826", url: "https://bugzilla.suse.com/1121826", }, { category: "self", summary: "SUSE Bug 1121872", url: "https://bugzilla.suse.com/1121872", }, { category: "self", summary: "SUSE Bug 1157298", url: "https://bugzilla.suse.com/1157298", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1173942", url: "https://bugzilla.suse.com/1173942", }, { category: "self", summary: "SUSE Bug 1176395", url: "https://bugzilla.suse.com/1176395", }, { category: "self", summary: "SUSE Bug 1176485", url: "https://bugzilla.suse.com/1176485", }, { category: "self", summary: "SUSE Bug 1177411", url: "https://bugzilla.suse.com/1177411", }, { category: "self", summary: "SUSE Bug 1178123", url: "https://bugzilla.suse.com/1178123", }, { category: "self", summary: "SUSE Bug 1178182", url: "https://bugzilla.suse.com/1178182", }, { category: "self", summary: "SUSE Bug 1178589", url: "https://bugzilla.suse.com/1178589", }, { category: "self", summary: "SUSE Bug 1178622", url: "https://bugzilla.suse.com/1178622", }, { category: "self", summary: "SUSE Bug 1178886", url: "https://bugzilla.suse.com/1178886", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179140", url: "https://bugzilla.suse.com/1179140", }, { category: "self", summary: "SUSE Bug 1179141", url: "https://bugzilla.suse.com/1179141", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179508", url: "https://bugzilla.suse.com/1179508", }, { category: "self", summary: "SUSE Bug 1179509", url: "https://bugzilla.suse.com/1179509", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179616", url: "https://bugzilla.suse.com/1179616", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179666", url: "https://bugzilla.suse.com/1179666", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179877", url: "https://bugzilla.suse.com/1179877", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179961", url: "https://bugzilla.suse.com/1179961", }, { category: "self", summary: "SUSE Bug 1180008", url: "https://bugzilla.suse.com/1180008", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180028", url: "https://bugzilla.suse.com/1180028", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180030", url: "https://bugzilla.suse.com/1180030", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180032", url: "https://bugzilla.suse.com/1180032", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180562", url: "https://bugzilla.suse.com/1180562", }, { category: "self", summary: "SUSE Bug 1181349", url: "https://bugzilla.suse.com/1181349", }, { category: "self", summary: "SUSE Bug 969755", url: "https://bugzilla.suse.com/969755", }, { category: "self", summary: "SUSE CVE CVE-2019-19063 page", url: "https://www.suse.com/security/cve/CVE-2019-19063/", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2019-6133 page", url: "https://www.suse.com/security/cve/CVE-2019-6133/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-15436 page", url: "https://www.suse.com/security/cve/CVE-2020-15436/", }, { category: "self", summary: "SUSE CVE CVE-2020-15437 page", url: "https://www.suse.com/security/cve/CVE-2020-15437/", }, { category: "self", summary: "SUSE CVE CVE-2020-25211 page", url: "https://www.suse.com/security/cve/CVE-2020-25211/", }, { category: "self", summary: "SUSE CVE CVE-2020-25285 page", url: "https://www.suse.com/security/cve/CVE-2020-25285/", }, { category: "self", summary: "SUSE CVE CVE-2020-25668 page", url: "https://www.suse.com/security/cve/CVE-2020-25668/", }, { category: "self", summary: "SUSE CVE CVE-2020-25669 page", url: "https://www.suse.com/security/cve/CVE-2020-25669/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27673 page", url: "https://www.suse.com/security/cve/CVE-2020-27673/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-28915 page", url: "https://www.suse.com/security/cve/CVE-2020-28915/", }, { category: "self", summary: "SUSE CVE CVE-2020-28974 page", url: "https://www.suse.com/security/cve/CVE-2020-28974/", }, { category: "self", summary: "SUSE CVE CVE-2020-29568 page", url: "https://www.suse.com/security/cve/CVE-2020-29568/", }, { category: "self", summary: "SUSE CVE CVE-2020-29569 page", url: "https://www.suse.com/security/cve/CVE-2020-29569/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2021-3347 page", url: "https://www.suse.com/security/cve/CVE-2021-3347/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-02-11T15:33:40Z", generator: { date: "2021-02-11T15:33:40Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0437-1", initial_release_date: "2021-02-11T15:33:40Z", revision_history: [ { date: "2021-02-11T15:33:40Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.149.1.aarch64", product: { name: "cluster-md-kmp-default-4.4.121-92.149.1.aarch64", product_id: "cluster-md-kmp-default-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.149.1.aarch64", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.149.1.aarch64", product_id: "cluster-md-kmp-vanilla-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.149.1.aarch64", product: { name: "cluster-network-kmp-default-4.4.121-92.149.1.aarch64", product_id: "cluster-network-kmp-default-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.149.1.aarch64", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.149.1.aarch64", product_id: "cluster-network-kmp-vanilla-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.149.1.aarch64", product: { name: "dlm-kmp-default-4.4.121-92.149.1.aarch64", product_id: "dlm-kmp-default-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.149.1.aarch64", product: { name: "dlm-kmp-vanilla-4.4.121-92.149.1.aarch64", product_id: "dlm-kmp-vanilla-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.149.1.aarch64", product: { name: "gfs2-kmp-default-4.4.121-92.149.1.aarch64", product_id: "gfs2-kmp-default-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.149.1.aarch64", product: { name: "gfs2-kmp-vanilla-4.4.121-92.149.1.aarch64", product_id: "gfs2-kmp-vanilla-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.149.1.aarch64", product: { name: "kernel-default-4.4.121-92.149.1.aarch64", product_id: "kernel-default-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.149.1.aarch64", product: { name: "kernel-default-base-4.4.121-92.149.1.aarch64", product_id: "kernel-default-base-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.149.1.aarch64", product: { name: "kernel-default-devel-4.4.121-92.149.1.aarch64", product_id: "kernel-default-devel-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.149.1.aarch64", product: { name: "kernel-default-extra-4.4.121-92.149.1.aarch64", product_id: "kernel-default-extra-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.149.1.aarch64", product: { name: "kernel-default-kgraft-4.4.121-92.149.1.aarch64", product_id: "kernel-default-kgraft-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.149.1.aarch64", product: { name: "kernel-obs-build-4.4.121-92.149.1.aarch64", product_id: "kernel-obs-build-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.149.1.aarch64", product: { name: "kernel-obs-qa-4.4.121-92.149.1.aarch64", product_id: "kernel-obs-qa-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.149.1.aarch64", product: { name: "kernel-syms-4.4.121-92.149.1.aarch64", product_id: "kernel-syms-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.149.1.aarch64", product: { name: "kernel-vanilla-4.4.121-92.149.1.aarch64", product_id: "kernel-vanilla-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.149.1.aarch64", product: { name: "kernel-vanilla-base-4.4.121-92.149.1.aarch64", product_id: "kernel-vanilla-base-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.149.1.aarch64", product: { name: "kernel-vanilla-devel-4.4.121-92.149.1.aarch64", product_id: "kernel-vanilla-devel-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.149.1.aarch64", product: { name: "ocfs2-kmp-default-4.4.121-92.149.1.aarch64", product_id: "ocfs2-kmp-default-4.4.121-92.149.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.149.1.aarch64", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.149.1.aarch64", product_id: "ocfs2-kmp-vanilla-4.4.121-92.149.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.4.121-92.149.1.noarch", product: { name: "kernel-devel-4.4.121-92.149.1.noarch", product_id: "kernel-devel-4.4.121-92.149.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.4.121-92.149.2.noarch", product: { name: "kernel-docs-4.4.121-92.149.2.noarch", product_id: "kernel-docs-4.4.121-92.149.2.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.4.121-92.149.2.noarch", product: { name: "kernel-docs-html-4.4.121-92.149.2.noarch", product_id: "kernel-docs-html-4.4.121-92.149.2.noarch", }, }, { category: "product_version", name: "kernel-docs-pdf-4.4.121-92.149.2.noarch", product: { name: "kernel-docs-pdf-4.4.121-92.149.2.noarch", product_id: "kernel-docs-pdf-4.4.121-92.149.2.noarch", }, }, { category: "product_version", name: "kernel-macros-4.4.121-92.149.1.noarch", product: { name: "kernel-macros-4.4.121-92.149.1.noarch", product_id: "kernel-macros-4.4.121-92.149.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.4.121-92.149.1.noarch", product: { name: "kernel-source-4.4.121-92.149.1.noarch", product_id: "kernel-source-4.4.121-92.149.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.4.121-92.149.1.noarch", product: { name: "kernel-source-vanilla-4.4.121-92.149.1.noarch", product_id: "kernel-source-vanilla-4.4.121-92.149.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.4.121-92.149.1.ppc64le", product: { name: "cluster-md-kmp-debug-4.4.121-92.149.1.ppc64le", product_id: "cluster-md-kmp-debug-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", product: { name: "cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", product_id: "cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.149.1.ppc64le", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.149.1.ppc64le", product_id: "cluster-md-kmp-vanilla-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-debug-4.4.121-92.149.1.ppc64le", product: { name: "cluster-network-kmp-debug-4.4.121-92.149.1.ppc64le", product_id: "cluster-network-kmp-debug-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", product: { name: "cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", product_id: "cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.149.1.ppc64le", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.149.1.ppc64le", product_id: "cluster-network-kmp-vanilla-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.121-92.149.1.ppc64le", product: { name: "dlm-kmp-debug-4.4.121-92.149.1.ppc64le", product_id: "dlm-kmp-debug-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.149.1.ppc64le", product: { name: "dlm-kmp-default-4.4.121-92.149.1.ppc64le", product_id: "dlm-kmp-default-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.149.1.ppc64le", product: { name: "dlm-kmp-vanilla-4.4.121-92.149.1.ppc64le", product_id: "dlm-kmp-vanilla-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.121-92.149.1.ppc64le", product: { name: "gfs2-kmp-debug-4.4.121-92.149.1.ppc64le", product_id: "gfs2-kmp-debug-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.149.1.ppc64le", product: { name: "gfs2-kmp-default-4.4.121-92.149.1.ppc64le", product_id: "gfs2-kmp-default-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.149.1.ppc64le", product: { name: "gfs2-kmp-vanilla-4.4.121-92.149.1.ppc64le", product_id: "gfs2-kmp-vanilla-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.4.121-92.149.1.ppc64le", product: { name: "kernel-debug-4.4.121-92.149.1.ppc64le", product_id: "kernel-debug-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.4.121-92.149.1.ppc64le", product: { name: "kernel-debug-base-4.4.121-92.149.1.ppc64le", product_id: "kernel-debug-base-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.121-92.149.1.ppc64le", product: { name: "kernel-debug-devel-4.4.121-92.149.1.ppc64le", product_id: "kernel-debug-devel-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.121-92.149.1.ppc64le", product: { name: "kernel-debug-extra-4.4.121-92.149.1.ppc64le", product_id: "kernel-debug-extra-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.121-92.149.1.ppc64le", product: { name: "kernel-debug-kgraft-4.4.121-92.149.1.ppc64le", product_id: "kernel-debug-kgraft-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.149.1.ppc64le", product: { name: "kernel-default-4.4.121-92.149.1.ppc64le", product_id: "kernel-default-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.149.1.ppc64le", product: { name: "kernel-default-base-4.4.121-92.149.1.ppc64le", product_id: "kernel-default-base-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.149.1.ppc64le", product: { name: "kernel-default-devel-4.4.121-92.149.1.ppc64le", product_id: "kernel-default-devel-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.149.1.ppc64le", product: { name: "kernel-default-extra-4.4.121-92.149.1.ppc64le", product_id: "kernel-default-extra-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.149.1.ppc64le", product: { name: "kernel-default-kgraft-4.4.121-92.149.1.ppc64le", product_id: "kernel-default-kgraft-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.149.1.ppc64le", product: { name: "kernel-obs-build-4.4.121-92.149.1.ppc64le", product_id: "kernel-obs-build-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.149.1.ppc64le", product: { name: "kernel-obs-qa-4.4.121-92.149.1.ppc64le", product_id: "kernel-obs-qa-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.149.1.ppc64le", product: { name: "kernel-syms-4.4.121-92.149.1.ppc64le", product_id: "kernel-syms-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.149.1.ppc64le", product: { name: "kernel-vanilla-4.4.121-92.149.1.ppc64le", product_id: "kernel-vanilla-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.149.1.ppc64le", product: { name: "kernel-vanilla-base-4.4.121-92.149.1.ppc64le", product_id: "kernel-vanilla-base-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.149.1.ppc64le", product: { name: "kernel-vanilla-devel-4.4.121-92.149.1.ppc64le", product_id: "kernel-vanilla-devel-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", product: { name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", product_id: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.121-92.149.1.ppc64le", product: { name: "ocfs2-kmp-debug-4.4.121-92.149.1.ppc64le", product_id: "ocfs2-kmp-debug-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", product: { name: "ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", product_id: "ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.149.1.ppc64le", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.149.1.ppc64le", product_id: "ocfs2-kmp-vanilla-4.4.121-92.149.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.149.1.s390x", product: { name: "cluster-md-kmp-default-4.4.121-92.149.1.s390x", product_id: "cluster-md-kmp-default-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.149.1.s390x", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.149.1.s390x", product_id: "cluster-md-kmp-vanilla-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.149.1.s390x", product: { name: "cluster-network-kmp-default-4.4.121-92.149.1.s390x", product_id: "cluster-network-kmp-default-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.149.1.s390x", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.149.1.s390x", product_id: "cluster-network-kmp-vanilla-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.149.1.s390x", product: { name: "dlm-kmp-default-4.4.121-92.149.1.s390x", product_id: "dlm-kmp-default-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.149.1.s390x", product: { name: "dlm-kmp-vanilla-4.4.121-92.149.1.s390x", product_id: "dlm-kmp-vanilla-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.149.1.s390x", product: { name: "gfs2-kmp-default-4.4.121-92.149.1.s390x", product_id: "gfs2-kmp-default-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.149.1.s390x", product: { name: "gfs2-kmp-vanilla-4.4.121-92.149.1.s390x", product_id: "gfs2-kmp-vanilla-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.149.1.s390x", product: { name: "kernel-default-4.4.121-92.149.1.s390x", product_id: "kernel-default-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.149.1.s390x", product: { name: "kernel-default-base-4.4.121-92.149.1.s390x", product_id: "kernel-default-base-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.149.1.s390x", product: { name: "kernel-default-devel-4.4.121-92.149.1.s390x", product_id: "kernel-default-devel-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.149.1.s390x", product: { name: "kernel-default-extra-4.4.121-92.149.1.s390x", product_id: "kernel-default-extra-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.149.1.s390x", product: { name: "kernel-default-kgraft-4.4.121-92.149.1.s390x", product_id: "kernel-default-kgraft-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.4.121-92.149.1.s390x", product: { name: "kernel-default-man-4.4.121-92.149.1.s390x", product_id: "kernel-default-man-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.149.1.s390x", product: { name: "kernel-obs-build-4.4.121-92.149.1.s390x", product_id: "kernel-obs-build-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.149.1.s390x", product: { name: "kernel-obs-qa-4.4.121-92.149.1.s390x", product_id: "kernel-obs-qa-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.149.1.s390x", product: { name: "kernel-syms-4.4.121-92.149.1.s390x", product_id: "kernel-syms-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.149.1.s390x", product: { name: "kernel-vanilla-4.4.121-92.149.1.s390x", product_id: "kernel-vanilla-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.149.1.s390x", product: { name: "kernel-vanilla-base-4.4.121-92.149.1.s390x", product_id: "kernel-vanilla-base-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.149.1.s390x", product: { name: "kernel-vanilla-devel-4.4.121-92.149.1.s390x", product_id: "kernel-vanilla-devel-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.4.121-92.149.1.s390x", product: { name: "kernel-zfcpdump-4.4.121-92.149.1.s390x", product_id: "kernel-zfcpdump-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.149.1.s390x", product: { name: "ocfs2-kmp-default-4.4.121-92.149.1.s390x", product_id: "ocfs2-kmp-default-4.4.121-92.149.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.149.1.s390x", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.149.1.s390x", product_id: "ocfs2-kmp-vanilla-4.4.121-92.149.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-debug-4.4.121-92.149.1.x86_64", product: { name: "cluster-md-kmp-debug-4.4.121-92.149.1.x86_64", product_id: "cluster-md-kmp-debug-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-default-4.4.121-92.149.1.x86_64", product: { name: "cluster-md-kmp-default-4.4.121-92.149.1.x86_64", product_id: "cluster-md-kmp-default-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-vanilla-4.4.121-92.149.1.x86_64", product: { name: "cluster-md-kmp-vanilla-4.4.121-92.149.1.x86_64", product_id: "cluster-md-kmp-vanilla-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-debug-4.4.121-92.149.1.x86_64", product: { name: "cluster-network-kmp-debug-4.4.121-92.149.1.x86_64", product_id: "cluster-network-kmp-debug-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-default-4.4.121-92.149.1.x86_64", product: { name: "cluster-network-kmp-default-4.4.121-92.149.1.x86_64", product_id: "cluster-network-kmp-default-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "cluster-network-kmp-vanilla-4.4.121-92.149.1.x86_64", product: { name: "cluster-network-kmp-vanilla-4.4.121-92.149.1.x86_64", product_id: "cluster-network-kmp-vanilla-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-debug-4.4.121-92.149.1.x86_64", product: { name: "dlm-kmp-debug-4.4.121-92.149.1.x86_64", product_id: "dlm-kmp-debug-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.4.121-92.149.1.x86_64", product: { name: "dlm-kmp-default-4.4.121-92.149.1.x86_64", product_id: "dlm-kmp-default-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-vanilla-4.4.121-92.149.1.x86_64", product: { name: "dlm-kmp-vanilla-4.4.121-92.149.1.x86_64", product_id: "dlm-kmp-vanilla-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-debug-4.4.121-92.149.1.x86_64", product: { name: "gfs2-kmp-debug-4.4.121-92.149.1.x86_64", product_id: "gfs2-kmp-debug-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.4.121-92.149.1.x86_64", product: { name: "gfs2-kmp-default-4.4.121-92.149.1.x86_64", product_id: "gfs2-kmp-default-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-vanilla-4.4.121-92.149.1.x86_64", product: { name: "gfs2-kmp-vanilla-4.4.121-92.149.1.x86_64", product_id: "gfs2-kmp-vanilla-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.4.121-92.149.1.x86_64", product: { name: "kernel-debug-4.4.121-92.149.1.x86_64", product_id: "kernel-debug-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.4.121-92.149.1.x86_64", product: { name: "kernel-debug-base-4.4.121-92.149.1.x86_64", product_id: "kernel-debug-base-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.4.121-92.149.1.x86_64", product: { name: "kernel-debug-devel-4.4.121-92.149.1.x86_64", product_id: "kernel-debug-devel-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-extra-4.4.121-92.149.1.x86_64", product: { name: "kernel-debug-extra-4.4.121-92.149.1.x86_64", product_id: "kernel-debug-extra-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-4.4.121-92.149.1.x86_64", product: { name: "kernel-debug-kgraft-4.4.121-92.149.1.x86_64", product_id: "kernel-debug-kgraft-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.4.121-92.149.1.x86_64", product: { name: "kernel-default-4.4.121-92.149.1.x86_64", product_id: "kernel-default-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.4.121-92.149.1.x86_64", product: { name: "kernel-default-base-4.4.121-92.149.1.x86_64", product_id: "kernel-default-base-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.4.121-92.149.1.x86_64", product: { name: "kernel-default-devel-4.4.121-92.149.1.x86_64", product_id: "kernel-default-devel-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.4.121-92.149.1.x86_64", product: { name: "kernel-default-extra-4.4.121-92.149.1.x86_64", product_id: "kernel-default-extra-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.4.121-92.149.1.x86_64", product: { name: "kernel-default-kgraft-4.4.121-92.149.1.x86_64", product_id: "kernel-default-kgraft-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.4.121-92.149.1.x86_64", product: { name: "kernel-obs-build-4.4.121-92.149.1.x86_64", product_id: "kernel-obs-build-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.4.121-92.149.1.x86_64", product: { name: "kernel-obs-qa-4.4.121-92.149.1.x86_64", product_id: "kernel-obs-qa-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.4.121-92.149.1.x86_64", product: { name: "kernel-syms-4.4.121-92.149.1.x86_64", product_id: "kernel-syms-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.4.121-92.149.1.x86_64", product: { name: "kernel-vanilla-4.4.121-92.149.1.x86_64", product_id: "kernel-vanilla-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.4.121-92.149.1.x86_64", product: { name: "kernel-vanilla-base-4.4.121-92.149.1.x86_64", product_id: "kernel-vanilla-base-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.4.121-92.149.1.x86_64", product: { name: "kernel-vanilla-devel-4.4.121-92.149.1.x86_64", product_id: "kernel-vanilla-devel-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", product: { name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", product_id: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-debug-4.4.121-92.149.1.x86_64", product: { name: "ocfs2-kmp-debug-4.4.121-92.149.1.x86_64", product_id: "ocfs2-kmp-debug-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.4.121-92.149.1.x86_64", product: { name: "ocfs2-kmp-default-4.4.121-92.149.1.x86_64", product_id: "ocfs2-kmp-default-4.4.121-92.149.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-vanilla-4.4.121-92.149.1.x86_64", product: { name: "ocfs2-kmp-vanilla-4.4.121-92.149.1.x86_64", product_id: "ocfs2-kmp-vanilla-4.4.121-92.149.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 7", product: { name: "SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:7", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP2", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp2", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP2-BCL", product: { name: "SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL", product_identification_helper: { cpe: "cpe:/o:suse:sles-bcl:12:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.149.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", }, product_reference: "kernel-default-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.149.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.149.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", }, product_reference: "kernel-default-base-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.149.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.149.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", }, product_reference: "kernel-default-devel-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.149.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.121-92.149.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", }, product_reference: "kernel-default-man-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.149.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.149.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.149.1.noarch as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", }, product_reference: "kernel-source-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.149.1.s390x as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", }, product_reference: "kernel-syms-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.149.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", product_id: "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 7", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", }, product_reference: "cluster-md-kmp-default-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", }, product_reference: "cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", }, product_reference: "cluster-network-kmp-default-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "cluster-network-kmp-default-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", }, product_reference: "cluster-network-kmp-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", }, product_reference: "dlm-kmp-default-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", }, product_reference: "dlm-kmp-default-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", }, product_reference: "dlm-kmp-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", }, product_reference: "gfs2-kmp-default-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", }, product_reference: "gfs2-kmp-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", }, product_reference: "ocfs2-kmp-default-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", }, product_reference: "kernel-default-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", }, product_reference: "kernel-default-base-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", }, product_reference: "kernel-source-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", }, product_reference: "kernel-syms-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", }, product_reference: "kernel-default-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", }, product_reference: "kernel-default-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", }, product_reference: "kernel-default-base-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", }, product_reference: "kernel-default-base-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", }, product_reference: "kernel-default-devel-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", }, product_reference: "kernel-default-devel-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", }, product_reference: "kernel-default-man-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", }, product_reference: "kernel-source-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.149.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", }, product_reference: "kernel-syms-4.4.121-92.149.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.149.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", }, product_reference: "kernel-syms-4.4.121-92.149.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", }, product_reference: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", }, product_reference: "kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-base-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-default-devel-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", }, product_reference: "kernel-devel-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", }, product_reference: "kernel-macros-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.4.121-92.149.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", }, product_reference: "kernel-source-4.4.121-92.149.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.4.121-92.149.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", product_id: "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", }, product_reference: "kernel-syms-4.4.121-92.149.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP2-BCL", }, ], }, vulnerabilities: [ { cve: "CVE-2019-19063", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19063", }, ], notes: [ { category: "general", text: "Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19063", url: "https://www.suse.com/security/cve/CVE-2019-19063", }, { category: "external", summary: "SUSE Bug 1157298 for CVE-2019-19063", url: "https://bugzilla.suse.com/1157298", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2019-19063", }, { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2019-6133", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-6133", }, ], notes: [ { category: "general", text: "In PolicyKit (aka polkit) 0.115, the \"start time\" protection mechanism can be bypassed because fork() is not atomic, and therefore authorization decisions are improperly cached. This is related to lack of uid checking in polkitbackend/polkitbackendinteractiveauthority.c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-6133", url: "https://www.suse.com/security/cve/CVE-2019-6133", }, { category: "external", summary: "SUSE Bug 1070943 for CVE-2019-6133", url: "https://bugzilla.suse.com/1070943", }, { category: "external", summary: "SUSE Bug 1121826 for CVE-2019-6133", url: "https://bugzilla.suse.com/1121826", }, { category: "external", summary: "SUSE Bug 1121872 for CVE-2019-6133", url: "https://bugzilla.suse.com/1121872", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2019-6133", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-15436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15436", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15436", url: "https://www.suse.com/security/cve/CVE-2020-15436", }, { category: "external", summary: "SUSE Bug 1179141 for CVE-2020-15436", url: "https://bugzilla.suse.com/1179141", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-15436", }, { cve: "CVE-2020-15437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15437", }, ], notes: [ { category: "general", text: "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15437", url: "https://www.suse.com/security/cve/CVE-2020-15437", }, { category: "external", summary: "SUSE Bug 1179140 for CVE-2020-15437", url: "https://bugzilla.suse.com/1179140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-15437", }, { cve: "CVE-2020-25211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25211", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25211", url: "https://www.suse.com/security/cve/CVE-2020-25211", }, { category: "external", summary: "SUSE Bug 1176395 for CVE-2020-25211", url: "https://bugzilla.suse.com/1176395", }, { category: "external", summary: "SUSE Bug 1192356 for CVE-2020-25211", url: "https://bugzilla.suse.com/1192356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-25211", }, { cve: "CVE-2020-25285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25285", }, ], notes: [ { category: "general", text: "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25285", url: "https://www.suse.com/security/cve/CVE-2020-25285", }, { category: "external", summary: "SUSE Bug 1176485 for CVE-2020-25285", url: "https://bugzilla.suse.com/1176485", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-25285", }, { cve: "CVE-2020-25668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25668", }, ], notes: [ { category: "general", text: "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25668", url: "https://www.suse.com/security/cve/CVE-2020-25668", }, { category: "external", summary: "SUSE Bug 1178123 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178123", }, { category: "external", summary: "SUSE Bug 1178622 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178622", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2020-25668", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-25668", }, { cve: "CVE-2020-25669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25669", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25669", url: "https://www.suse.com/security/cve/CVE-2020-25669", }, { category: "external", summary: "SUSE Bug 1178182 for CVE-2020-25669", url: "https://bugzilla.suse.com/1178182", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-25669", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27673", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27673", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27673", url: "https://www.suse.com/security/cve/CVE-2020-27673", }, { category: "external", summary: "SUSE Bug 1177411 for CVE-2020-27673", url: "https://bugzilla.suse.com/1177411", }, { category: "external", summary: "SUSE Bug 1184583 for CVE-2020-27673", url: "https://bugzilla.suse.com/1184583", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-27673", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-28915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28915", }, ], notes: [ { category: "general", text: "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28915", url: "https://www.suse.com/security/cve/CVE-2020-28915", }, { category: "external", summary: "SUSE Bug 1178886 for CVE-2020-28915", url: "https://bugzilla.suse.com/1178886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-28915", }, { cve: "CVE-2020-28974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28974", }, ], notes: [ { category: "general", text: "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28974", url: "https://www.suse.com/security/cve/CVE-2020-28974", }, { category: "external", summary: "SUSE Bug 1178589 for CVE-2020-28974", url: "https://bugzilla.suse.com/1178589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-28974", }, { cve: "CVE-2020-29568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29568", }, ], notes: [ { category: "general", text: "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29568", url: "https://www.suse.com/security/cve/CVE-2020-29568", }, { category: "external", summary: "SUSE Bug 1179508 for CVE-2020-29568", url: "https://bugzilla.suse.com/1179508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "moderate", }, ], title: "CVE-2020-29568", }, { cve: "CVE-2020-29569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29569", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29569", url: "https://www.suse.com/security/cve/CVE-2020-29569", }, { category: "external", summary: "SUSE Bug 1179509 for CVE-2020-29569", url: "https://bugzilla.suse.com/1179509", }, { category: "external", summary: "SUSE Bug 1180008 for CVE-2020-29569", url: "https://bugzilla.suse.com/1180008", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-29569", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2021-3347", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3347", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3347", url: "https://www.suse.com/security/cve/CVE-2021-3347", }, { category: "external", summary: "SUSE Bug 1181349 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181349", }, { category: "external", summary: "SUSE Bug 1181553 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181553", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2021-3347", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.149.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.149.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.149.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_149-default-1-3.3.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:33:40Z", details: "important", }, ], title: "CVE-2021-3347", }, ], }
suse-su-2021:0133-1
Vulnerability from csaf_suse
Published
2021-01-15 08:10
Modified
2021-01-15 08:10
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-28374: Fixed a LIO security issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#1179663).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2018-20669: Fixed an improper check i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c (bsc#1122971).
The following non-security bugs were fixed:
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: timer: Limit max amount of slave instances (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
- ASoC: sti: fix possible sleep-in-atomic (git-fixes).
- ASoC: wm8904: fix regcache handling (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: fix backtrace on coredump (git-fixes).
- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- ath9k_htc: Discard undersized packets (git-fixes).
- ath9k_htc: Modify byte order for an error message (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- Avoid a GCC warning about '/*' within a comment.
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).
- Bluetooth: Fix advertising duplicated flags (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#1050242).
- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: mcp251x: add error check when wq alloc failed (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#1066129).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#1129770)
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- EDAC/i10nm: Use readl() to access MMIO registers (12sp5).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178) Backporting changes: * updated path drivers/video/fbcon/core to drivers/video/console
- fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: * updated path drivers/video/fbcon/core to drivers/video/console * context changes
- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).
- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
- gpio: max77620: Fixup debounce delays (git-fixes).
- gpio: max77620: Use correct unit for debounce times (git-fixes).
- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).
- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).
- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).
- gpiolib: fix up emulated open drain outputs (git-fixes).
- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: Improve Windows Precision Touchpad detection (git-fixes).
- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).
- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- igc: Fix returning wrong statistics (bsc#1118657).
- iio: adc: max1027: Reset the device at probe time (git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio: fix center temperature of bmc150-accel-core (git-fixes).
- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).
- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).
- iio: srf04: fix wrong limitation in distance measuring (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- ipw2x00: Fix -Wcast-function-type (git-fixes).
- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- kABI fix for g2d (git-fixes).
- kABI workaround for dsa/b53 changes (git-fixes).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for net/ipvlan changes (git-fixes).
- kABI workaround for usermodehelper changes (bsc#1179406).
- kABI: ath10k: move a new structure member to the end (git-fixes).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: fix authentication with iwlwifi/mvm (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- matroxfb: avoid -Warray-bounds warning (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md/raid5: fix oops during stripe resizing (git-fixes).
- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).
- media: cec-funcs.h: add status_req checks (git-fixes).
- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
- media: i2c: ov2659: Fix missing 720p register config (git-fixes).
- media: i2c: ov2659: fix s_stream return value (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).
- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: si470x-i2c: add missed operations in remove (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).
- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- mlxsw: core: Fix memory leak on module removal (bsc#1112374).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- Move upstreamed bt fixes into sorted section
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/tls: Fix kmap usage (bsc#1109837).
- net/tls: missing received data after fast remote close (bsc#1109837).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
- net: aquantia: fix LRO with FCS error (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).
- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).
- net: dsa: b53: Ensure the default VID is untagged (git-fixes).
- net: dsa: b53: Fix default VLAN ID (git-fixes).
- net: dsa: b53: Properly account for VLAN filtering (git-fixes).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).
- net: dsa: qca8k: remove leftover phy accessors (git-fixes).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (git-fixes).
- net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).
- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
- net: macb: add missing barriers when reading descriptors (git-fixes).
- net: macb: fix dropped RX frames due to a race (git-fixes).
- net: macb: fix error format in dev_err() (git-fixes).
- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).
- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
- net: phy: Avoid multiple suspends (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#1104389).
- net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).
- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
- net: stmmac: fix csr_clk can't be zero issue (git-fixes).
- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).
- net: usb: sr9800: fix uninitialized local variable (git-fixes).
- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
- net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#1056787).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nfp: use correct define to return NONE fec (bsc#1109837).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- ocfs2: fix unbalanced locking (bsc#1180506).
- ocfs2: initialize ip_next_orphan (bsc#1179724).
- orinoco: Move context allocation after processing the skb (git-fixes).
- parport: load lowlevel driver if ports not found (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- phy: Revert toggling reset changes (git-fixes).
- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).
- PM: ACPI: Output correct message on target power state (git-fixes).
- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- ppp: remove the PPPIOCDETACH ioctl (git-fixes).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#1050545).
- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (bsc#1050536 bsc#1050545).
- qed: suppress false-positives interrupt error messages on HW init (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#1050545).
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).
- reboot: fix overflow parsing reboot cpu number (bsc#1179421).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).
- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).
- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: Fix wrong rvring index computation (git-fixes).
- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
- rtc: 88pm860x: fix possible race condition (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).
- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (git-fixes).
- s390/stp: add locking to sysfs functions (git-fixes).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
- scsi: lpfc: Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
- scsi: lpfc: Use generic power management (bsc#1164780).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: Remove unneeded break statements (bsc#1164780).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: imx: gpc: fix power up sequencing (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: img-spfi: fix potential double release (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: pxa2xx: Add missed security checks (git-fixes).
- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: add missed clk_unprepare (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- splice: only read in as much information as there is pipe buffer space (bsc#1179520).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: add a missing dependency (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).
- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
- staging: rtl8188eu: fix possible null dereference (git-fixes).
- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1103992).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#1103992).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).
- tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#1109837).
- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).
- timer: Fix wheel index calculation on last level (git fixes)
- timer: Prevent base->clk from moving backward (git-fixes)
- tracing: Fix out of bounds write in get_trace_buf (bsc#1179403).
- tty: always relink the port (git-fixes).
- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
- tty: link tty and port before configuring it as console (git-fixes).
- tty: synclink_gt: Adjust indentation in several functions (git-fixes).
- tty: synclinkmp: Adjust indentation in several functions (git-fixes).
- tty:serial:mvebu-uart:fix a wrong return (git-fixes).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc2: Fix IN FIFO allocation (git-fixes).
- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
- usb: fsl: Check memory resource before releasing it (git-fixes).
- usb: gadget: composite: Fix possible double free memory bug (git-fixes).
- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).
- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
- usb: gadget: fix wrong endpoint desc (git-fixes).
- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: ldusb: use unsigned size format specifiers (git-fixes).
- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).
- usb: serial: digi_acceleport: clean up set_termios (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: digi_acceleport: remove in_interrupt() usage.
- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).
- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).
- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: Skip endpoints with 0 maxpacket length (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- usermodehelper: reset umask to default before executing user process (bsc#1179406).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- vt: do not hardcode the mem allocation upper bound (git-fixes).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: da9062: do not ping the hw during stop() (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1114648).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames
SUSE-2021-133,SUSE-SLE-HA-12-SP5-2021-133,SUSE-SLE-Live-Patching-12-SP5-2021-133,SUSE-SLE-SDK-12-SP5-2021-133,SUSE-SLE-SERVER-12-SP5-2021-133,SUSE-SLE-WE-12-SP5-2021-133
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-28374: Fixed a LIO security issue (bsc#1178372).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#1179663).\n- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2018-20669: Fixed an improper check i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c (bsc#1122971).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).\n- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).\n- ALSA: ca0106: fix error code handling (git-fixes).\n- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).\n- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).\n- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).\n- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).\n- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).\n- ALSA: timer: Limit max amount of slave instances (git-fixes).\n- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).\n- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).\n- ASoC: sti: fix possible sleep-in-atomic (git-fixes).\n- ASoC: wm8904: fix regcache handling (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: fix backtrace on coredump (git-fixes).\n- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).\n- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- ath9k_htc: Discard undersized packets (git-fixes).\n- ath9k_htc: Modify byte order for an error message (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- Avoid a GCC warning about '/*' within a comment.\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).\n- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).\n- Bluetooth: Fix advertising duplicated flags (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#1050242).\n- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: mcp251x: add error check when wq alloc failed (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).\n- coredump: fix core_pattern parse error (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#1066129).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#1129770)\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- EDAC/i10nm: Use readl() to access MMIO registers (12sp5).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178) Backporting changes: \t* updated path drivers/video/fbcon/core to drivers/video/console\n- fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: \t* updated path drivers/video/fbcon/core to drivers/video/console \t* context changes\n- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).\n- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).\n- gpio: max77620: Fixup debounce delays (git-fixes).\n- gpio: max77620: Use correct unit for debounce times (git-fixes).\n- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).\n- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).\n- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).\n- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).\n- gpiolib: fix up emulated open drain outputs (git-fixes).\n- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).\n- HID: core: Correctly handle ReportSize being zero (git-fixes).\n- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: Improve Windows Precision Touchpad detection (git-fixes).\n- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).\n- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).\n- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).\n- i2c: i801: Fix resume bug (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- igc: Fix returning wrong statistics (bsc#1118657).\n- iio: adc: max1027: Reset the device at probe time (git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).\n- iio: fix center temperature of bmc150-accel-core (git-fixes).\n- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).\n- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).\n- iio: srf04: fix wrong limitation in distance measuring (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- Input: trackpoint - add new trackpoint variant IDs (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- ipw2x00: Fix -Wcast-function-type (git-fixes).\n- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- kABI fix for g2d (git-fixes).\n- kABI workaround for dsa/b53 changes (git-fixes).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for net/ipvlan changes (git-fixes).\n- kABI workaround for usermodehelper changes (bsc#1179406).\n- kABI: ath10k: move a new structure member to the end (git-fixes).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- kgdb: Fix spurious true from in_dbg_master() (git-fixes).\n- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: fix authentication with iwlwifi/mvm (git-fixes).\n- mac80211: fix use of skb payload instead of header (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- matroxfb: avoid -Warray-bounds warning (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md/raid5: fix oops during stripe resizing (git-fixes).\n- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).\n- media: cec-funcs.h: add status_req checks (git-fixes).\n- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).\n- media: i2c: ov2659: Fix missing 720p register config (git-fixes).\n- media: i2c: ov2659: fix s_stream return value (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).\n- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: si470x-i2c: add missed operations in remove (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).\n- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).\n- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mei: protect mei_cl_mtu from null dereference (git-fixes).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- mlxsw: core: Fix memory leak on module removal (bsc#1112374).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- Move upstreamed bt fixes into sorted section\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/tls: Fix kmap usage (bsc#1109837).\n- net/tls: missing received data after fast remote close (bsc#1109837).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).\n- net: aquantia: fix LRO with FCS error (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).\n- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).\n- net: dsa: b53: Ensure the default VID is untagged (git-fixes).\n- net: dsa: b53: Fix default VLAN ID (git-fixes).\n- net: dsa: b53: Properly account for VLAN filtering (git-fixes).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).\n- net: dsa: qca8k: remove leftover phy accessors (git-fixes).\n- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).\n- net: ena: handle bad request id in ena_netdev (git-fixes).\n- net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).\n- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).\n- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).\n- net: macb: add missing barriers when reading descriptors (git-fixes).\n- net: macb: fix dropped RX frames due to a race (git-fixes).\n- net: macb: fix error format in dev_err() (git-fixes).\n- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).\n- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).\n- net: phy: Avoid multiple suspends (git-fixes).\n- net: qed: fix 'maybe uninitialized' warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#1104389).\n- net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).\n- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).\n- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).\n- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).\n- net: stmmac: fix csr_clk can't be zero issue (git-fixes).\n- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).\n- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).\n- net: usb: sr9800: fix uninitialized local variable (git-fixes).\n- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).\n- net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#1056787).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).\n- nfp: use correct define to return NONE fec (bsc#1109837).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- ocfs2: initialize ip_next_orphan (bsc#1179724).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- parport: load lowlevel driver if ports not found (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- phy: Revert toggling reset changes (git-fixes).\n- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).\n- PM: ACPI: Output correct message on target power state (git-fixes).\n- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).\n- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- ppp: remove the PPPIOCDETACH ioctl (git-fixes).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#1050545).\n- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (bsc#1050536 bsc#1050545).\n- qed: suppress false-positives interrupt error messages on HW init (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).\n- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).\n- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#1050545).\n- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).\n- reboot: fix overflow parsing reboot cpu number (bsc#1179421).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).\n- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).\n- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- remoteproc: Fix wrong rvring index computation (git-fixes).\n- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).\n- rtc: 88pm860x: fix possible race condition (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).\n- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).\n- s390/bpf: Fix multiple tail calls (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (git-fixes).\n- s390/stp: add locking to sysfs functions (git-fixes).\n- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).\n- scsi: lpfc: Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).\n- scsi: lpfc: Use generic power management (bsc#1164780).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: Remove unneeded break statements (bsc#1164780).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).\n- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).\n- SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: imx: gpc: fix power up sequencing (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: Fix memory leak on splited transfers (git-fixes).\n- spi: img-spfi: fix potential double release (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: pxa2xx: Add missed security checks (git-fixes).\n- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).\n- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: add missed clk_unprepare (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- splice: only read in as much information as there is pipe buffer space (bsc#1179520).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: add a missing dependency (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).\n- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).\n- staging: rtl8188eu: fix possible null dereference (git-fixes).\n- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).\n- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1103992).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).\n- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#1103992).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).\n- tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#1109837).\n- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).\n- timer: Fix wheel index calculation on last level (git fixes)\n- timer: Prevent base->clk from moving backward (git-fixes)\n- tracing: Fix out of bounds write in get_trace_buf (bsc#1179403).\n- tty: always relink the port (git-fixes).\n- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).\n- tty: link tty and port before configuring it as console (git-fixes).\n- tty: synclink_gt: Adjust indentation in several functions (git-fixes).\n- tty: synclinkmp: Adjust indentation in several functions (git-fixes).\n- tty:serial:mvebu-uart:fix a wrong return (git-fixes).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).\n- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- usb: dwc2: Fix IN FIFO allocation (git-fixes).\n- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).\n- usb: fsl: Check memory resource before releasing it (git-fixes).\n- usb: gadget: composite: Fix possible double free memory bug (git-fixes).\n- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).\n- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).\n- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).\n- usb: gadget: fix wrong endpoint desc (git-fixes).\n- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).\n- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).\n- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).\n- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- usb: ldusb: use unsigned size format specifiers (git-fixes).\n- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).\n- usb: serial: digi_acceleport: clean up set_termios (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: digi_acceleport: remove in_interrupt() usage.\n- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).\n- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).\n- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: kl5kusb105: fix memleak on open (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: serial: option: fix Quectel BG96 matching (git-fixes).\n- usb: Skip endpoints with 0 maxpacket length (git-fixes).\n- usb: UAS: introduce a quirk to set no_write_same (git-fixes).\n- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- usermodehelper: reset umask to default before executing user process (bsc#1179406).\n- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).\n- vt: do not hardcode the mem allocation upper bound (git-fixes).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: da9062: do not ping the hw during stop() (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).\n- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1114648).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).\n- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).\n- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-133,SUSE-SLE-HA-12-SP5-2021-133,SUSE-SLE-Live-Patching-12-SP5-2021-133,SUSE-SLE-SDK-12-SP5-2021-133,SUSE-SLE-SERVER-12-SP5-2021-133,SUSE-SLE-WE-12-SP5-2021-133", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0133-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0133-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210133-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0133-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008212.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1050242", url: "https://bugzilla.suse.com/1050242", }, { category: "self", summary: "SUSE Bug 1050536", url: "https://bugzilla.suse.com/1050536", }, { category: "self", summary: "SUSE Bug 1050545", url: "https://bugzilla.suse.com/1050545", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1056653", url: "https://bugzilla.suse.com/1056653", }, { category: "self", summary: "SUSE Bug 1056657", url: "https://bugzilla.suse.com/1056657", }, { category: "self", summary: "SUSE Bug 1056787", url: "https://bugzilla.suse.com/1056787", }, { category: "self", summary: "SUSE Bug 1064802", url: "https://bugzilla.suse.com/1064802", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066129", url: "https://bugzilla.suse.com/1066129", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103992", url: "https://bugzilla.suse.com/1103992", }, { category: "self", summary: "SUSE Bug 1104389", url: "https://bugzilla.suse.com/1104389", }, { category: "self", summary: "SUSE Bug 1104393", url: "https://bugzilla.suse.com/1104393", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1110096", url: "https://bugzilla.suse.com/1110096", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1118657", url: "https://bugzilla.suse.com/1118657", }, { category: "self", summary: "SUSE Bug 1122971", url: "https://bugzilla.suse.com/1122971", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1136460", url: "https://bugzilla.suse.com/1136460", }, { category: "self", summary: "SUSE Bug 1136461", url: "https://bugzilla.suse.com/1136461", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1144912", url: "https://bugzilla.suse.com/1144912", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1164780", url: "https://bugzilla.suse.com/1164780", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172538", url: "https://bugzilla.suse.com/1172538", }, { category: "self", summary: "SUSE Bug 1172694", url: "https://bugzilla.suse.com/1172694", }, { category: "self", summary: "SUSE Bug 1174784", url: "https://bugzilla.suse.com/1174784", }, { category: "self", summary: "SUSE Bug 1174852", url: "https://bugzilla.suse.com/1174852", }, { category: "self", summary: "SUSE Bug 1176558", url: "https://bugzilla.suse.com/1176558", }, { category: "self", summary: "SUSE Bug 1176559", url: "https://bugzilla.suse.com/1176559", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178372", url: "https://bugzilla.suse.com/1178372", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179142", url: "https://bugzilla.suse.com/1179142", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179403", url: "https://bugzilla.suse.com/1179403", }, { category: "self", summary: "SUSE Bug 1179406", url: "https://bugzilla.suse.com/1179406", }, { category: "self", summary: "SUSE Bug 1179418", url: "https://bugzilla.suse.com/1179418", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179421", url: "https://bugzilla.suse.com/1179421", }, { category: "self", summary: "SUSE Bug 1179444", url: "https://bugzilla.suse.com/1179444", }, { category: "self", summary: "SUSE Bug 1179520", url: "https://bugzilla.suse.com/1179520", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179616", url: "https://bugzilla.suse.com/1179616", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179666", url: "https://bugzilla.suse.com/1179666", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1179724", url: "https://bugzilla.suse.com/1179724", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179810", url: "https://bugzilla.suse.com/1179810", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE CVE CVE-2018-20669 page", url: "https://www.suse.com/security/cve/CVE-2018-20669/", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-28374 page", url: "https://www.suse.com/security/cve/CVE-2020-28374/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-15T08:10:36Z", generator: { date: "2021-01-15T08:10:36Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0133-1", initial_release_date: "2021-01-15T08:10:36Z", revision_history: [ { date: "2021-01-15T08:10:36Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.57.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-122.57.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.57.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-122.57.1.aarch64", product_id: "dlm-kmp-default-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.57.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-122.57.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.57.1.aarch64", product: { name: "kernel-default-4.12.14-122.57.1.aarch64", product_id: "kernel-default-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.57.1.aarch64", product: { name: "kernel-default-base-4.12.14-122.57.1.aarch64", product_id: "kernel-default-base-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.57.1.aarch64", product: { name: "kernel-default-devel-4.12.14-122.57.1.aarch64", product_id: "kernel-default-devel-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.57.1.aarch64", product: { name: "kernel-default-extra-4.12.14-122.57.1.aarch64", product_id: "kernel-default-extra-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.57.1.aarch64", product: { name: "kernel-default-kgraft-4.12.14-122.57.1.aarch64", product_id: "kernel-default-kgraft-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.57.1.aarch64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.57.1.aarch64", product_id: "kernel-default-kgraft-devel-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.57.1.aarch64", product: { name: "kernel-obs-build-4.12.14-122.57.1.aarch64", product_id: "kernel-obs-build-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.57.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-122.57.1.aarch64", product_id: "kernel-obs-qa-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.57.1.aarch64", product: { name: "kernel-syms-4.12.14-122.57.1.aarch64", product_id: "kernel-syms-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.57.1.aarch64", product: { name: "kernel-vanilla-4.12.14-122.57.1.aarch64", product_id: "kernel-vanilla-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.57.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-122.57.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.57.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-122.57.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.aarch64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.aarch64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.57.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-122.57.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-122.57.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.57.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-122.57.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-122.57.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-122.57.1.noarch", product: { name: "kernel-devel-4.12.14-122.57.1.noarch", product_id: "kernel-devel-4.12.14-122.57.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-122.57.1.noarch", product: { name: "kernel-docs-4.12.14-122.57.1.noarch", product_id: "kernel-docs-4.12.14-122.57.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-122.57.1.noarch", product: { name: "kernel-docs-html-4.12.14-122.57.1.noarch", product_id: "kernel-docs-html-4.12.14-122.57.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-122.57.1.noarch", product: { name: "kernel-macros-4.12.14-122.57.1.noarch", product_id: "kernel-macros-4.12.14-122.57.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-122.57.1.noarch", product: { name: "kernel-source-4.12.14-122.57.1.noarch", product_id: "kernel-source-4.12.14-122.57.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-122.57.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-122.57.1.noarch", product_id: "kernel-source-vanilla-4.12.14-122.57.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.57.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-122.57.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.57.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-122.57.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.57.1.ppc64le", product: { name: "kernel-debug-4.12.14-122.57.1.ppc64le", product_id: "kernel-debug-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.57.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-122.57.1.ppc64le", product_id: "kernel-debug-base-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.57.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-122.57.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-122.57.1.ppc64le", product: { name: "kernel-debug-kgraft-devel-4.12.14-122.57.1.ppc64le", product_id: "kernel-debug-kgraft-devel-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.57.1.ppc64le", product: { name: "kernel-default-4.12.14-122.57.1.ppc64le", product_id: "kernel-default-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.57.1.ppc64le", product: { name: "kernel-default-base-4.12.14-122.57.1.ppc64le", product_id: "kernel-default-base-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.57.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-122.57.1.ppc64le", product_id: "kernel-default-devel-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.57.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-122.57.1.ppc64le", product_id: "kernel-default-extra-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.57.1.ppc64le", product: { name: "kernel-default-kgraft-4.12.14-122.57.1.ppc64le", product_id: "kernel-default-kgraft-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", product: { name: "kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", product_id: "kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.57.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-122.57.1.ppc64le", product_id: "kernel-obs-build-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.57.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-122.57.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.57.1.ppc64le", product: { name: "kernel-syms-4.12.14-122.57.1.ppc64le", product_id: "kernel-syms-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.57.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-122.57.1.ppc64le", product_id: "kernel-vanilla-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.57.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-122.57.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.57.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-122.57.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.ppc64le", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.ppc64le", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", product: { name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", product_id: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.57.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-122.57.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-122.57.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.57.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-122.57.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.57.1.s390x", product: { name: "dlm-kmp-default-4.12.14-122.57.1.s390x", product_id: "dlm-kmp-default-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.57.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-122.57.1.s390x", product_id: "gfs2-kmp-default-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.57.1.s390x", product: { name: "kernel-default-4.12.14-122.57.1.s390x", product_id: "kernel-default-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.57.1.s390x", product: { name: "kernel-default-base-4.12.14-122.57.1.s390x", product_id: "kernel-default-base-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.57.1.s390x", product: { name: "kernel-default-devel-4.12.14-122.57.1.s390x", product_id: "kernel-default-devel-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.57.1.s390x", product: { name: "kernel-default-extra-4.12.14-122.57.1.s390x", product_id: "kernel-default-extra-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.57.1.s390x", product: { name: "kernel-default-kgraft-4.12.14-122.57.1.s390x", product_id: "kernel-default-kgraft-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", product: { name: "kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", product_id: "kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-122.57.1.s390x", product: { name: "kernel-default-man-4.12.14-122.57.1.s390x", product_id: "kernel-default-man-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.57.1.s390x", product: { name: "kernel-obs-build-4.12.14-122.57.1.s390x", product_id: "kernel-obs-build-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.57.1.s390x", product: { name: "kernel-obs-qa-4.12.14-122.57.1.s390x", product_id: "kernel-obs-qa-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.57.1.s390x", product: { name: "kernel-syms-4.12.14-122.57.1.s390x", product_id: "kernel-syms-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.57.1.s390x", product: { name: "kernel-vanilla-4.12.14-122.57.1.s390x", product_id: "kernel-vanilla-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.57.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-122.57.1.s390x", product_id: "kernel-vanilla-base-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.57.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-122.57.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.s390x", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.s390x", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-122.57.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-122.57.1.s390x", product_id: "kernel-zfcpdump-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-122.57.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-122.57.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", product: { name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", product_id: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.57.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-122.57.1.s390x", product_id: "kselftests-kmp-default-4.12.14-122.57.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.57.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-122.57.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-122.57.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-122.57.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-122.57.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-122.57.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-122.57.1.x86_64", product_id: "dlm-kmp-default-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-122.57.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-122.57.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-122.57.1.x86_64", product: { name: "kernel-debug-4.12.14-122.57.1.x86_64", product_id: "kernel-debug-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-122.57.1.x86_64", product: { name: "kernel-debug-base-4.12.14-122.57.1.x86_64", product_id: "kernel-debug-base-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-122.57.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-122.57.1.x86_64", product_id: "kernel-debug-devel-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-122.57.1.x86_64", product: { name: "kernel-debug-kgraft-devel-4.12.14-122.57.1.x86_64", product_id: "kernel-debug-kgraft-devel-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-122.57.1.x86_64", product: { name: "kernel-default-4.12.14-122.57.1.x86_64", product_id: "kernel-default-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-122.57.1.x86_64", product: { name: "kernel-default-base-4.12.14-122.57.1.x86_64", product_id: "kernel-default-base-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-122.57.1.x86_64", product: { name: "kernel-default-devel-4.12.14-122.57.1.x86_64", product_id: "kernel-default-devel-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-122.57.1.x86_64", product: { name: "kernel-default-extra-4.12.14-122.57.1.x86_64", product_id: "kernel-default-extra-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-122.57.1.x86_64", product: { name: "kernel-default-kgraft-4.12.14-122.57.1.x86_64", product_id: "kernel-default-kgraft-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", product: { name: "kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", product_id: "kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-122.57.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-122.57.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-122.57.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-122.57.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-122.57.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-122.57.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-kgraft-devel-4.12.14-122.57.1.x86_64", product: { name: "kernel-kvmsmall-kgraft-devel-4.12.14-122.57.1.x86_64", product_id: "kernel-kvmsmall-kgraft-devel-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-122.57.1.x86_64", product: { name: "kernel-obs-build-4.12.14-122.57.1.x86_64", product_id: "kernel-obs-build-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-122.57.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-122.57.1.x86_64", product_id: "kernel-obs-qa-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-122.57.1.x86_64", product: { name: "kernel-syms-4.12.14-122.57.1.x86_64", product_id: "kernel-syms-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-122.57.1.x86_64", product: { name: "kernel-vanilla-4.12.14-122.57.1.x86_64", product_id: "kernel-vanilla-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-122.57.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-122.57.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-122.57.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-122.57.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.x86_64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.x86_64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", product: { name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", product_id: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-122.57.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-122.57.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-122.57.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-122.57.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-122.57.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-122.57.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP5", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP5", product: { name: "SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product: { name: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-sdk:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP5", product: { name: "SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp5", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product: { name: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-kgraft-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-kgraft-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", }, product_reference: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5", product_id: "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-122.57.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", }, product_reference: "kernel-docs-4.12.14-122.57.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5", product_id: "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Software Development Kit 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-default-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-default-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-base-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-man-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.57.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", }, product_reference: "kernel-devel-4.12.14-122.57.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.57.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", }, product_reference: "kernel-macros-4.12.14-122.57.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.57.1.noarch as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", }, product_reference: "kernel-source-4.12.14-122.57.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-syms-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", }, product_reference: "kernel-syms-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5", product_id: "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-syms-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-default-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-default-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-base-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", }, product_reference: "kernel-default-man-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-122.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", }, product_reference: "kernel-devel-4.12.14-122.57.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-122.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", }, product_reference: "kernel-macros-4.12.14-122.57.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-122.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", }, product_reference: "kernel-source-4.12.14-122.57.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.57.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", }, product_reference: "kernel-syms-4.12.14-122.57.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.57.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-122.57.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.57.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", }, product_reference: "kernel-syms-4.12.14-122.57.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-syms-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-122.57.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5", product_id: "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-122.57.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20669", }, ], notes: [ { category: "general", text: "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20669", url: "https://www.suse.com/security/cve/CVE-2018-20669", }, { category: "external", summary: "SUSE Bug 1122971 for CVE-2018-20669", url: "https://bugzilla.suse.com/1122971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2018-20669", }, { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-28374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28374", }, ], notes: [ { category: "general", text: "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28374", url: "https://www.suse.com/security/cve/CVE-2020-28374", }, { category: "external", summary: "SUSE Bug 1178372 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178372", }, { category: "external", summary: "SUSE Bug 1178684 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178684", }, { category: "external", summary: "SUSE Bug 1180676 for CVE-2020-28374", url: "https://bugzilla.suse.com/1180676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2020-28374", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_57-default-1-8.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.57.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.57.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.57.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-15T08:10:36Z", details: "moderate", }, ], title: "CVE-2020-4788", }, ], }
suse-su-2021:0434-1
Vulnerability from csaf_suse
Published
2021-02-11 08:49
Modified
2021-02-11 08:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket() that could be triggered by local attackers (with access to the nbd device) via an I/O request (bnc#1181504).
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
The following non-security bugs were fixed:
- blk-mq: improve heavily contended tag case (bsc#1178198).
- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (bsc#1163727).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- Move upstreamed bt fixes into sorted section
- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
- net/x25: prevent a couple of overflows (bsc#1178590).
- NFS: mark nfsiod as CPU_INTENSIVE (bsc#1177304).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).
- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).
- SUNRPC: cache: ignore timestamp written to 'flush' file (bsc#1178036).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- xfrm: Fix memleak on xfrm state destroy (bsc#1158775).
Patchnames
SUSE-2021-434,SUSE-OpenStack-Cloud-9-2021-434,SUSE-OpenStack-Cloud-Crowbar-9-2021-434,SUSE-SLE-HA-12-SP4-2021-434,SUSE-SLE-Live-Patching-12-SP4-2021-434,SUSE-SLE-SAP-12-SP4-2021-434,SUSE-SLE-SERVER-12-SP4-LTSS-2021-434
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket() that could be triggered by local attackers (with access to the nbd device) via an I/O request (bnc#1181504).\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-29371: Fixed uninitialized memory leaks to userspace (bsc#1179429).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).\n- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).\n\nThe following non-security bugs were fixed:\n\n- blk-mq: improve heavily contended tag case (bsc#1178198).\n- debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).\n- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md-cluster: Fix potential error pointer dereference in resize_bitmaps() (bsc#1163727).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- Move upstreamed bt fixes into sorted section\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- NFS: mark nfsiod as CPU_INTENSIVE (bsc#1177304).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- scsi: ibmvfc: Avoid link down on FS9100 canister reboot (bsc#1176962 ltc#188304).\n- scsi: ibmvfc: Use compiler attribute defines instead of __attribute__() (bsc#1176962 ltc#188304).\n- SUNRPC: cache: ignore timestamp written to 'flush' file (bsc#1178036).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- xfrm: Fix memleak on xfrm state destroy (bsc#1158775).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-434,SUSE-OpenStack-Cloud-9-2021-434,SUSE-OpenStack-Cloud-Crowbar-9-2021-434,SUSE-SLE-HA-12-SP4-2021-434,SUSE-SLE-Live-Patching-12-SP4-2021-434,SUSE-SLE-SAP-12-SP4-2021-434,SUSE-SLE-SERVER-12-SP4-LTSS-2021-434", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0434-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0434-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210434-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0434-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008308.html", }, { category: "self", summary: "SUSE Bug 1144912", url: "https://bugzilla.suse.com/1144912", }, { category: "self", summary: "SUSE Bug 1149032", url: "https://bugzilla.suse.com/1149032", }, { category: "self", summary: "SUSE Bug 1158775", url: "https://bugzilla.suse.com/1158775", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1171979", url: "https://bugzilla.suse.com/1171979", }, { category: "self", summary: "SUSE Bug 1176395", url: "https://bugzilla.suse.com/1176395", }, { category: "self", summary: "SUSE Bug 1176846", url: "https://bugzilla.suse.com/1176846", }, { category: "self", summary: "SUSE Bug 1176962", url: "https://bugzilla.suse.com/1176962", }, { category: "self", summary: "SUSE Bug 1177304", url: "https://bugzilla.suse.com/1177304", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1178036", url: "https://bugzilla.suse.com/1178036", }, { category: "self", summary: "SUSE Bug 1178182", url: "https://bugzilla.suse.com/1178182", }, { category: "self", summary: "SUSE Bug 1178198", url: "https://bugzilla.suse.com/1178198", }, { category: "self", summary: "SUSE Bug 1178372", url: "https://bugzilla.suse.com/1178372", }, { category: "self", summary: "SUSE Bug 1178589", url: "https://bugzilla.suse.com/1178589", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178684", url: "https://bugzilla.suse.com/1178684", }, { category: "self", summary: "SUSE Bug 1178886", url: "https://bugzilla.suse.com/1178886", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179140", url: "https://bugzilla.suse.com/1179140", }, { category: "self", summary: "SUSE Bug 1179141", url: "https://bugzilla.suse.com/1179141", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179429", url: "https://bugzilla.suse.com/1179429", }, { category: "self", summary: "SUSE Bug 1179508", url: "https://bugzilla.suse.com/1179508", }, { category: "self", summary: "SUSE Bug 1179509", url: "https://bugzilla.suse.com/1179509", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179616", url: "https://bugzilla.suse.com/1179616", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179666", url: "https://bugzilla.suse.com/1179666", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179877", url: "https://bugzilla.suse.com/1179877", }, { category: "self", summary: "SUSE Bug 1179878", url: "https://bugzilla.suse.com/1179878", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179961", url: "https://bugzilla.suse.com/1179961", }, { category: "self", summary: "SUSE Bug 1180008", url: "https://bugzilla.suse.com/1180008", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180028", url: "https://bugzilla.suse.com/1180028", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180030", url: "https://bugzilla.suse.com/1180030", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180032", url: "https://bugzilla.suse.com/1180032", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180562", url: "https://bugzilla.suse.com/1180562", }, { category: "self", summary: "SUSE Bug 1180676", url: "https://bugzilla.suse.com/1180676", }, { category: "self", summary: "SUSE Bug 1181001", url: "https://bugzilla.suse.com/1181001", }, { category: "self", summary: "SUSE Bug 1181158", url: "https://bugzilla.suse.com/1181158", }, { category: "self", summary: "SUSE Bug 1181349", url: "https://bugzilla.suse.com/1181349", }, { category: "self", summary: "SUSE Bug 1181504", url: "https://bugzilla.suse.com/1181504", }, { category: "self", summary: "SUSE Bug 1181553", url: "https://bugzilla.suse.com/1181553", }, { category: "self", summary: "SUSE Bug 1181645", url: "https://bugzilla.suse.com/1181645", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-15436 page", url: "https://www.suse.com/security/cve/CVE-2020-15436/", }, { category: "self", summary: "SUSE CVE CVE-2020-15437 page", url: "https://www.suse.com/security/cve/CVE-2020-15437/", }, { category: "self", summary: "SUSE CVE CVE-2020-25211 page", url: "https://www.suse.com/security/cve/CVE-2020-25211/", }, { category: "self", summary: "SUSE CVE CVE-2020-25639 page", url: "https://www.suse.com/security/cve/CVE-2020-25639/", }, { category: "self", summary: "SUSE CVE CVE-2020-25669 page", url: "https://www.suse.com/security/cve/CVE-2020-25669/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-27835 page", url: "https://www.suse.com/security/cve/CVE-2020-27835/", }, { category: "self", summary: "SUSE CVE CVE-2020-28374 page", url: "https://www.suse.com/security/cve/CVE-2020-28374/", }, { category: "self", summary: "SUSE CVE CVE-2020-28915 page", url: "https://www.suse.com/security/cve/CVE-2020-28915/", }, { category: "self", summary: "SUSE CVE CVE-2020-28974 page", url: "https://www.suse.com/security/cve/CVE-2020-28974/", }, { category: "self", summary: "SUSE CVE CVE-2020-29371 page", url: "https://www.suse.com/security/cve/CVE-2020-29371/", }, { category: "self", summary: "SUSE CVE CVE-2020-29568 page", url: "https://www.suse.com/security/cve/CVE-2020-29568/", }, { category: "self", summary: "SUSE CVE CVE-2020-29569 page", url: "https://www.suse.com/security/cve/CVE-2020-29569/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, { category: "self", summary: "SUSE CVE CVE-2021-3347 page", url: "https://www.suse.com/security/cve/CVE-2021-3347/", }, { category: "self", summary: "SUSE CVE CVE-2021-3348 page", url: "https://www.suse.com/security/cve/CVE-2021-3348/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-02-11T08:49:30Z", generator: { date: "2021-02-11T08:49:30Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0434-1", initial_release_date: "2021-02-11T08:49:30Z", revision_history: [ { date: "2021-02-11T08:49:30Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.68.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-95.68.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.68.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-95.68.1.aarch64", product_id: "dlm-kmp-default-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.68.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-95.68.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.68.1.aarch64", product: { name: "kernel-default-4.12.14-95.68.1.aarch64", product_id: "kernel-default-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.68.1.aarch64", product: { name: "kernel-default-base-4.12.14-95.68.1.aarch64", product_id: "kernel-default-base-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.68.1.aarch64", product: { name: "kernel-default-devel-4.12.14-95.68.1.aarch64", product_id: "kernel-default-devel-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.68.1.aarch64", product: { name: "kernel-default-extra-4.12.14-95.68.1.aarch64", product_id: "kernel-default-extra-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.68.1.aarch64", product: { name: "kernel-default-kgraft-4.12.14-95.68.1.aarch64", product_id: "kernel-default-kgraft-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.68.1.aarch64", product: { name: "kernel-default-kgraft-devel-4.12.14-95.68.1.aarch64", product_id: "kernel-default-kgraft-devel-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.68.1.aarch64", product: { name: "kernel-obs-build-4.12.14-95.68.1.aarch64", product_id: "kernel-obs-build-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.68.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-95.68.1.aarch64", product_id: "kernel-obs-qa-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.68.1.aarch64", product: { name: "kernel-syms-4.12.14-95.68.1.aarch64", product_id: "kernel-syms-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.68.1.aarch64", product: { name: "kernel-vanilla-4.12.14-95.68.1.aarch64", product_id: "kernel-vanilla-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.68.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-95.68.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.68.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-95.68.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.aarch64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.aarch64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.68.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-95.68.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-95.68.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.68.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-95.68.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-95.68.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-95.68.1.noarch", product: { name: "kernel-devel-4.12.14-95.68.1.noarch", product_id: "kernel-devel-4.12.14-95.68.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-95.68.1.noarch", product: { name: "kernel-docs-4.12.14-95.68.1.noarch", product_id: "kernel-docs-4.12.14-95.68.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-95.68.1.noarch", product: { name: "kernel-docs-html-4.12.14-95.68.1.noarch", product_id: "kernel-docs-html-4.12.14-95.68.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-95.68.1.noarch", product: { name: "kernel-macros-4.12.14-95.68.1.noarch", product_id: "kernel-macros-4.12.14-95.68.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-95.68.1.noarch", product: { name: "kernel-source-4.12.14-95.68.1.noarch", product_id: "kernel-source-4.12.14-95.68.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-95.68.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-95.68.1.noarch", product_id: "kernel-source-vanilla-4.12.14-95.68.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.68.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-95.68.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.68.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-95.68.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-95.68.1.ppc64le", product: { name: "kernel-debug-4.12.14-95.68.1.ppc64le", product_id: "kernel-debug-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-95.68.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-95.68.1.ppc64le", product_id: "kernel-debug-base-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-95.68.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-95.68.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-95.68.1.ppc64le", product: { name: "kernel-debug-kgraft-devel-4.12.14-95.68.1.ppc64le", product_id: "kernel-debug-kgraft-devel-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.68.1.ppc64le", product: { name: "kernel-default-4.12.14-95.68.1.ppc64le", product_id: "kernel-default-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.68.1.ppc64le", product: { name: "kernel-default-base-4.12.14-95.68.1.ppc64le", product_id: "kernel-default-base-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.68.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-95.68.1.ppc64le", product_id: "kernel-default-devel-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.68.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-95.68.1.ppc64le", product_id: "kernel-default-extra-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.68.1.ppc64le", product: { name: "kernel-default-kgraft-4.12.14-95.68.1.ppc64le", product_id: "kernel-default-kgraft-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", product: { name: "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", product_id: "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.68.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-95.68.1.ppc64le", product_id: "kernel-obs-build-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.68.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-95.68.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.68.1.ppc64le", product: { name: "kernel-syms-4.12.14-95.68.1.ppc64le", product_id: "kernel-syms-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.68.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-95.68.1.ppc64le", product_id: "kernel-vanilla-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.68.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-95.68.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.68.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-95.68.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.ppc64le", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.ppc64le", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", product: { name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", product_id: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.68.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-95.68.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-95.68.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.68.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-95.68.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.68.1.s390x", product: { name: "dlm-kmp-default-4.12.14-95.68.1.s390x", product_id: "dlm-kmp-default-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.68.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-95.68.1.s390x", product_id: "gfs2-kmp-default-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.68.1.s390x", product: { name: "kernel-default-4.12.14-95.68.1.s390x", product_id: "kernel-default-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.68.1.s390x", product: { name: "kernel-default-base-4.12.14-95.68.1.s390x", product_id: "kernel-default-base-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.68.1.s390x", product: { name: "kernel-default-devel-4.12.14-95.68.1.s390x", product_id: "kernel-default-devel-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.68.1.s390x", product: { name: "kernel-default-extra-4.12.14-95.68.1.s390x", product_id: "kernel-default-extra-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.68.1.s390x", product: { name: "kernel-default-kgraft-4.12.14-95.68.1.s390x", product_id: "kernel-default-kgraft-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", product: { name: "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", product_id: "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-95.68.1.s390x", product: { name: "kernel-default-man-4.12.14-95.68.1.s390x", product_id: "kernel-default-man-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.68.1.s390x", product: { name: "kernel-obs-build-4.12.14-95.68.1.s390x", product_id: "kernel-obs-build-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.68.1.s390x", product: { name: "kernel-obs-qa-4.12.14-95.68.1.s390x", product_id: "kernel-obs-qa-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.68.1.s390x", product: { name: "kernel-syms-4.12.14-95.68.1.s390x", product_id: "kernel-syms-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.68.1.s390x", product: { name: "kernel-vanilla-4.12.14-95.68.1.s390x", product_id: "kernel-vanilla-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.68.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-95.68.1.s390x", product_id: "kernel-vanilla-base-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.68.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-95.68.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.s390x", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.s390x", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-95.68.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-95.68.1.s390x", product_id: "kernel-zfcpdump-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-95.68.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-95.68.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", product: { name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", product_id: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.68.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-95.68.1.s390x", product_id: "kselftests-kmp-default-4.12.14-95.68.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.68.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-95.68.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-95.68.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-95.68.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-95.68.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-95.68.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-95.68.1.x86_64", product_id: "dlm-kmp-default-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-95.68.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-95.68.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-95.68.1.x86_64", product: { name: "kernel-debug-4.12.14-95.68.1.x86_64", product_id: "kernel-debug-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-95.68.1.x86_64", product: { name: "kernel-debug-base-4.12.14-95.68.1.x86_64", product_id: "kernel-debug-base-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-95.68.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-95.68.1.x86_64", product_id: "kernel-debug-devel-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-kgraft-devel-4.12.14-95.68.1.x86_64", product: { name: "kernel-debug-kgraft-devel-4.12.14-95.68.1.x86_64", product_id: "kernel-debug-kgraft-devel-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-95.68.1.x86_64", product: { name: "kernel-default-4.12.14-95.68.1.x86_64", product_id: "kernel-default-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-95.68.1.x86_64", product: { name: "kernel-default-base-4.12.14-95.68.1.x86_64", product_id: "kernel-default-base-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-95.68.1.x86_64", product: { name: "kernel-default-devel-4.12.14-95.68.1.x86_64", product_id: "kernel-default-devel-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-95.68.1.x86_64", product: { name: "kernel-default-extra-4.12.14-95.68.1.x86_64", product_id: "kernel-default-extra-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-4.12.14-95.68.1.x86_64", product: { name: "kernel-default-kgraft-4.12.14-95.68.1.x86_64", product_id: "kernel-default-kgraft-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", product: { name: "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", product_id: "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-95.68.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-95.68.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-95.68.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-95.68.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-95.68.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-95.68.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-kgraft-devel-4.12.14-95.68.1.x86_64", product: { name: "kernel-kvmsmall-kgraft-devel-4.12.14-95.68.1.x86_64", product_id: "kernel-kvmsmall-kgraft-devel-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-95.68.1.x86_64", product: { name: "kernel-obs-build-4.12.14-95.68.1.x86_64", product_id: "kernel-obs-build-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-95.68.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-95.68.1.x86_64", product_id: "kernel-obs-qa-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-95.68.1.x86_64", product: { name: "kernel-syms-4.12.14-95.68.1.x86_64", product_id: "kernel-syms-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-95.68.1.x86_64", product: { name: "kernel-vanilla-4.12.14-95.68.1.x86_64", product_id: "kernel-vanilla-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-95.68.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-95.68.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-95.68.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-95.68.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.x86_64", product: { name: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.x86_64", product_id: "kernel-vanilla-kgraft-devel-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", product: { name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", product_id: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-95.68.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-95.68.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-95.68.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-95.68.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-95.68.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-95.68.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 9", product: { name: "SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:9", }, }, }, { category: "product_name", name: "SUSE OpenStack Cloud Crowbar 9", product: { name: "SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud-crowbar:9", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 12 SP4", product: { name: "SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 12 SP4", product: { name: "SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sle-live-patching:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp4", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp4", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", }, product_reference: "kernel-source-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud 9", product_id: "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.68.1.noarch as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", }, product_reference: "kernel-source-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.68.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 9", product_id: "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud Crowbar 9", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", product_id: "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-default-kgraft-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", }, product_reference: "kernel-default-kgraft-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-kgraft-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", }, product_reference: "kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", }, product_reference: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", }, product_reference: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", product_id: "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", }, product_reference: "kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-default-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", }, product_reference: "kernel-source-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP4", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.68.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", }, product_reference: "kernel-default-4.12.14-95.68.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-default-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", }, product_reference: "kernel-default-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.68.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-95.68.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", }, product_reference: "kernel-default-base-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.68.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-95.68.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", }, product_reference: "kernel-default-man-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", }, product_reference: "kernel-devel-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", }, product_reference: "kernel-macros-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-95.68.1.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", }, product_reference: "kernel-source-4.12.14-95.68.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.68.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", }, product_reference: "kernel-syms-4.12.14-95.68.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.68.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-95.68.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.68.1.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", }, product_reference: "kernel-syms-4.12.14-95.68.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-95.68.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", }, product_reference: "kernel-syms-4.12.14-95.68.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP4-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-15436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15436", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15436", url: "https://www.suse.com/security/cve/CVE-2020-15436", }, { category: "external", summary: "SUSE Bug 1179141 for CVE-2020-15436", url: "https://bugzilla.suse.com/1179141", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-15436", }, { cve: "CVE-2020-15437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15437", }, ], notes: [ { category: "general", text: "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15437", url: "https://www.suse.com/security/cve/CVE-2020-15437", }, { category: "external", summary: "SUSE Bug 1179140 for CVE-2020-15437", url: "https://bugzilla.suse.com/1179140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-15437", }, { cve: "CVE-2020-25211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25211", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25211", url: "https://www.suse.com/security/cve/CVE-2020-25211", }, { category: "external", summary: "SUSE Bug 1176395 for CVE-2020-25211", url: "https://bugzilla.suse.com/1176395", }, { category: "external", summary: "SUSE Bug 1192356 for CVE-2020-25211", url: "https://bugzilla.suse.com/1192356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-25211", }, { cve: "CVE-2020-25639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25639", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25639", url: "https://www.suse.com/security/cve/CVE-2020-25639", }, { category: "external", summary: "SUSE Bug 1176846 for CVE-2020-25639", url: "https://bugzilla.suse.com/1176846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-25639", }, { cve: "CVE-2020-25669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25669", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25669", url: "https://www.suse.com/security/cve/CVE-2020-25669", }, { category: "external", summary: "SUSE Bug 1178182 for CVE-2020-25669", url: "https://bugzilla.suse.com/1178182", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-25669", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-27835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27835", }, ], notes: [ { category: "general", text: "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27835", url: "https://www.suse.com/security/cve/CVE-2020-27835", }, { category: "external", summary: "SUSE Bug 1179878 for CVE-2020-27835", url: "https://bugzilla.suse.com/1179878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-27835", }, { cve: "CVE-2020-28374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28374", }, ], notes: [ { category: "general", text: "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28374", url: "https://www.suse.com/security/cve/CVE-2020-28374", }, { category: "external", summary: "SUSE Bug 1178372 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178372", }, { category: "external", summary: "SUSE Bug 1178684 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178684", }, { category: "external", summary: "SUSE Bug 1180676 for CVE-2020-28374", url: "https://bugzilla.suse.com/1180676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-28374", }, { cve: "CVE-2020-28915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28915", }, ], notes: [ { category: "general", text: "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28915", url: "https://www.suse.com/security/cve/CVE-2020-28915", }, { category: "external", summary: "SUSE Bug 1178886 for CVE-2020-28915", url: "https://bugzilla.suse.com/1178886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-28915", }, { cve: "CVE-2020-28974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28974", }, ], notes: [ { category: "general", text: "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28974", url: "https://www.suse.com/security/cve/CVE-2020-28974", }, { category: "external", summary: "SUSE Bug 1178589 for CVE-2020-28974", url: "https://bugzilla.suse.com/1178589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-28974", }, { cve: "CVE-2020-29371", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29371", }, ], notes: [ { category: "general", text: "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29371", url: "https://www.suse.com/security/cve/CVE-2020-29371", }, { category: "external", summary: "SUSE Bug 1179429 for CVE-2020-29371", url: "https://bugzilla.suse.com/1179429", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "low", }, ], title: "CVE-2020-29371", }, { cve: "CVE-2020-29568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29568", }, ], notes: [ { category: "general", text: "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29568", url: "https://www.suse.com/security/cve/CVE-2020-29568", }, { category: "external", summary: "SUSE Bug 1179508 for CVE-2020-29568", url: "https://bugzilla.suse.com/1179508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-29568", }, { cve: "CVE-2020-29569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29569", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29569", url: "https://www.suse.com/security/cve/CVE-2020-29569", }, { category: "external", summary: "SUSE Bug 1179509 for CVE-2020-29569", url: "https://bugzilla.suse.com/1179509", }, { category: "external", summary: "SUSE Bug 1180008 for CVE-2020-29569", url: "https://bugzilla.suse.com/1180008", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-29569", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2020-4788", }, { cve: "CVE-2021-3347", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3347", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3347", url: "https://www.suse.com/security/cve/CVE-2021-3347", }, { category: "external", summary: "SUSE Bug 1181349 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181349", }, { category: "external", summary: "SUSE Bug 1181553 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181553", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2021-3347", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "important", }, ], title: "CVE-2021-3347", }, { cve: "CVE-2021-3348", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3348", }, ], notes: [ { category: "general", text: "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3348", url: "https://www.suse.com/security/cve/CVE-2021-3348", }, { category: "external", summary: "SUSE Bug 1181504 for CVE-2021-3348", url: "https://bugzilla.suse.com/1181504", }, { category: "external", summary: "SUSE Bug 1181645 for CVE-2021-3348", url: "https://bugzilla.suse.com/1181645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.s390x", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_68-default-1-6.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.aarch64", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.s390x", "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.68.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.68.1.x86_64", "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.68.1.noarch", "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.68.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T08:49:30Z", details: "moderate", }, ], title: "CVE-2021-3348", }, ], }
suse-su-2021:0118-1
Vulnerability from csaf_suse
Published
2021-01-14 05:16
Modified
2021-01-14 05:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#1179663).
- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).
The following non-security bugs were fixed:
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: timer: Limit max amount of slave instances (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
- ASoC: sti: fix possible sleep-in-atomic (git-fixes).
- ASoC: wm8904: fix regcache handling (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: fix backtrace on coredump (git-fixes).
- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- ath9k_htc: Discard undersized packets (git-fixes).
- ath9k_htc: Modify byte order for an error message (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- Avoid a GCC warning about '/*' within a comment.
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).
- Bluetooth: Fix advertising duplicated flags (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).
- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#1050242).
- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: mcp251x: add error check when wq alloc failed (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#1066129).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#1129770)
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178) Backporting changes: * updated path drivers/video/fbcon/core to drivers/video/console
- fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: * updated path drivers/video/fbcon/core to drivers/video/console * context changes
- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).
- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
- gpio: max77620: Fixup debounce delays (git-fixes).
- gpio: max77620: Use correct unit for debounce times (git-fixes).
- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).
- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).
- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).
- gpiolib: fix up emulated open drain outputs (git-fixes).
- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: Improve Windows Precision Touchpad detection (git-fixes).
- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).
- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- igc: Fix returning wrong statistics (bsc#1118657).
- iio: adc: max1027: Reset the device at probe time (git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio: fix center temperature of bmc150-accel-core (git-fixes).
- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).
- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).
- iio: srf04: fix wrong limitation in distance measuring (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- ipw2x00: Fix -Wcast-function-type (git-fixes).
- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- kABI fix for g2d (git-fixes).
- kABI workaround for dsa/b53 changes (git-fixes).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for net/ipvlan changes (git-fixes).
- kABI: ath10k: move a new structure member to the end (git-fixes).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: fix authentication with iwlwifi/mvm (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- matroxfb: avoid -Warray-bounds warning (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md/raid5: fix oops during stripe resizing (git-fixes).
- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).
- media: cec-funcs.h: add status_req checks (git-fixes).
- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
- media: i2c: ov2659: Fix missing 720p register config (git-fixes).
- media: i2c: ov2659: fix s_stream return value (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).
- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: si470x-i2c: add missed operations in remove (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).
- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- mlxsw: core: Fix memory leak on module removal (bsc#1112374).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/tls: Fix kmap usage (bsc#1109837).
- net/tls: missing received data after fast remote close (bsc#1109837).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
- net: aquantia: fix LRO with FCS error (git-fixes).
- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).
- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).
- net: dsa: b53: Ensure the default VID is untagged (git-fixes).
- net: dsa: b53: Fix default VLAN ID (git-fixes).
- net: dsa: b53: Properly account for VLAN filtering (git-fixes).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).
- net: dsa: qca8k: remove leftover phy accessors (git-fixes).
- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).
- net: ena: handle bad request id in ena_netdev (git-fixes).
- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
- net: macb: add missing barriers when reading descriptors (git-fixes).
- net: macb: fix dropped RX frames due to a race (git-fixes).
- net: macb: fix error format in dev_err() (git-fixes).
- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).
- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
- net: phy: Avoid multiple suspends (git-fixes).
- net: qed: fix 'maybe uninitialized' warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#1104389).
- net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).
- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
- net: stmmac: fix csr_clk can't be zero issue (git-fixes).
- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).
- net: usb: sr9800: fix uninitialized local variable (git-fixes).
- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
- net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#1056787).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- nfp: use correct define to return NONE fec (bsc#1109837).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- ocfs2: fix unbalanced locking (bsc#1180506).
- ocfs2: initialize ip_next_orphan (bsc#1179724).
- orinoco: Move context allocation after processing the skb (git-fixes).
- parport: load lowlevel driver if ports not found (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- phy: Revert toggling reset changes (git-fixes).
- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).
- PM: ACPI: Output correct message on target power state (git-fixes).
- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- ppp: remove the PPPIOCDETACH ioctl (git-fixes).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#1050545).
- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (bsc#1050536 bsc#1050545).
- qed: suppress false-positives interrupt error messages on HW init (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#1050545).
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).
- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).
- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: Fix wrong rvring index computation (git-fixes).
- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
- rtc: 88pm860x: fix possible race condition (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).
- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (git-fixes).
- s390/stp: add locking to sysfs functions (git-fixes).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
- scsi: lpfc: Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
- scsi: lpfc: Use generic power management (bsc#1164780).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: Remove unneeded break statements (bsc#1164780).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: imx: gpc: fix power up sequencing (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: img-spfi: fix potential double release (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: pxa2xx: Add missed security checks (git-fixes).
- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: add missed clk_unprepare (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- splice: only read in as much information as there is pipe buffer space (bsc#1179520).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: add a missing dependency (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).
- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
- staging: rtl8188eu: fix possible null dereference (git-fixes).
- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1103992).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).
- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#1103992).
- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).
- tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#1109837).
- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).
- timer: Fix wheel index calculation on last level (git fixes)
- timer: Prevent base->clk from moving backward (git-fixes)
- tty: always relink the port (git-fixes).
- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
- tty: link tty and port before configuring it as console (git-fixes).
- tty: synclink_gt: Adjust indentation in several functions (git-fixes).
- tty: synclinkmp: Adjust indentation in several functions (git-fixes).
- tty:serial:mvebu-uart:fix a wrong return (git-fixes).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc2: Fix IN FIFO allocation (git-fixes).
- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
- usb: fsl: Check memory resource before releasing it (git-fixes).
- usb: gadget: composite: Fix possible double free memory bug (git-fixes).
- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).
- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
- usb: gadget: fix wrong endpoint desc (git-fixes).
- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: ldusb: use unsigned size format specifiers (git-fixes).
- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).
- usb: serial: digi_acceleport: clean up set_termios (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: digi_acceleport: remove in_interrupt() usage.
- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).
- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).
- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: Skip endpoints with 0 maxpacket length (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- vt: do not hardcode the mem allocation upper bound (git-fixes).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: da9062: do not ping the hw during stop() (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames
SUSE-2021-118,SUSE-SLE-Module-Basesystem-15-SP1-2021-118,SUSE-SLE-Module-Development-Tools-15-SP1-2021-118,SUSE-SLE-Module-Legacy-15-SP1-2021-118,SUSE-SLE-Module-Live-Patching-15-SP1-2021-118,SUSE-SLE-Product-HA-15-SP1-2021-118,SUSE-SLE-Product-WE-15-SP1-2021-118
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed, aka CID-16d51a590a8c (bsc#1179663).\n- CVE-2020-27786: Fixed a use after free in kernel midi subsystem snd_rawmidi_kernel_read1() (bsc#1179601).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).\n- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).\n- ALSA: ca0106: fix error code handling (git-fixes).\n- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).\n- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).\n- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).\n- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).\n- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).\n- ALSA: timer: Limit max amount of slave instances (git-fixes).\n- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).\n- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).\n- ASoC: sti: fix possible sleep-in-atomic (git-fixes).\n- ASoC: wm8904: fix regcache handling (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: fix backtrace on coredump (git-fixes).\n- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).\n- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- ath9k_htc: Discard undersized packets (git-fixes).\n- ath9k_htc: Modify byte order for an error message (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- Avoid a GCC warning about '/*' within a comment.\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).\n- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).\n- Bluetooth: Fix advertising duplicated flags (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- bnxt_en: Fix race when modifying pause settings (bsc#1050242 ).\n- bnxt_en: Protect bnxt_set_eee() and bnxt_set_pauseparam() with mutex (bsc#1050242).\n- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: mcp251x: add error check when wq alloc failed (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).\n- coredump: fix core_pattern parse error (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- cxgb4: Fix offset when clearing filter byte counters (bsc#1064802 bsc#1066129).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#1129770)\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178) Backporting changes: \t* updated path drivers/video/fbcon/core to drivers/video/console\n- fbcon: Remove the superfluous break (bsc#1129770) Backporting changes: \t* updated path drivers/video/fbcon/core to drivers/video/console \t* context changes\n- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).\n- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).\n- gpio: max77620: Fixup debounce delays (git-fixes).\n- gpio: max77620: Use correct unit for debounce times (git-fixes).\n- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).\n- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).\n- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).\n- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).\n- gpiolib: fix up emulated open drain outputs (git-fixes).\n- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).\n- HID: core: Correctly handle ReportSize being zero (git-fixes).\n- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: Improve Windows Precision Touchpad detection (git-fixes).\n- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).\n- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).\n- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).\n- i2c: i801: Fix resume bug (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- igc: Fix returning wrong statistics (bsc#1118657).\n- iio: adc: max1027: Reset the device at probe time (git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).\n- iio: fix center temperature of bmc150-accel-core (git-fixes).\n- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).\n- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).\n- iio: srf04: fix wrong limitation in distance measuring (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- Input: trackpoint - add new trackpoint variant IDs (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- ipw2x00: Fix -Wcast-function-type (git-fixes).\n- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- kABI fix for g2d (git-fixes).\n- kABI workaround for dsa/b53 changes (git-fixes).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for net/ipvlan changes (git-fixes).\n- kABI: ath10k: move a new structure member to the end (git-fixes).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- kgdb: Fix spurious true from in_dbg_master() (git-fixes).\n- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: fix authentication with iwlwifi/mvm (git-fixes).\n- mac80211: fix use of skb payload instead of header (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- matroxfb: avoid -Warray-bounds warning (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md/raid5: fix oops during stripe resizing (git-fixes).\n- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).\n- media: cec-funcs.h: add status_req checks (git-fixes).\n- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).\n- media: i2c: ov2659: Fix missing 720p register config (git-fixes).\n- media: i2c: ov2659: fix s_stream return value (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).\n- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: si470x-i2c: add missed operations in remove (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).\n- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).\n- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mei: protect mei_cl_mtu from null dereference (git-fixes).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- mlxsw: core: Fix memory leak on module removal (bsc#1112374).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/tls: Fix kmap usage (bsc#1109837).\n- net/tls: missing received data after fast remote close (bsc#1109837).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).\n- net: aquantia: fix LRO with FCS error (git-fixes).\n- net: DCB: Validate DCB_ATTR_DCB_BUFFER argument (bsc#1103990 ).\n- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).\n- net: dsa: b53: Ensure the default VID is untagged (git-fixes).\n- net: dsa: b53: Fix default VLAN ID (git-fixes).\n- net: dsa: b53: Properly account for VLAN filtering (git-fixes).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).\n- net: dsa: qca8k: remove leftover phy accessors (git-fixes).\n- net: ena: fix packet's addresses for rx_offset feature (bsc#1174852).\n- net: ena: handle bad request id in ena_netdev (git-fixes).\n- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).\n- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).\n- net: macb: add missing barriers when reading descriptors (git-fixes).\n- net: macb: fix dropped RX frames due to a race (git-fixes).\n- net: macb: fix error format in dev_err() (git-fixes).\n- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).\n- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).\n- net: phy: Avoid multiple suspends (git-fixes).\n- net: qed: fix 'maybe uninitialized' warning (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: qed: fix async event callbacks unregistering (bsc#1104393 bsc#1104389).\n- net: qede: fix PTP initialization on recovery (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: qede: fix use-after-free on recovery and AER handling (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).\n- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).\n- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).\n- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).\n- net: stmmac: fix csr_clk can't be zero issue (git-fixes).\n- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).\n- net: thunderx: use spin_lock_bh in nicvf_set_rx_mode_task() (bsc#1110096).\n- net: usb: sr9800: fix uninitialized local variable (git-fixes).\n- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).\n- net_sched: fix a memory leak in atm_tc_init() (bsc#1056657 bsc#1056653 bsc#1056787).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).\n- nfp: use correct define to return NONE fec (bsc#1109837).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- ocfs2: initialize ip_next_orphan (bsc#1179724).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- parport: load lowlevel driver if ports not found (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- phy: Revert toggling reset changes (git-fixes).\n- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).\n- PM: ACPI: Output correct message on target power state (git-fixes).\n- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).\n- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- ppp: remove the PPPIOCDETACH ioctl (git-fixes).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- qed: fix error return code in qed_iwarp_ll2_start() (bsc#1050536 bsc#1050545).\n- qed: suppress 'do not support RoCE & iWARP' flooding on HW init (bsc#1050536 bsc#1050545).\n- qed: suppress false-positives interrupt error messages on HW init (bsc#1136460 jsc#SLE-4691 bsc#1136461 jsc#SLE-4692).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).\n- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).\n- RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (bsc#1050545).\n- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1050545 ).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).\n- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).\n- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- remoteproc: Fix wrong rvring index computation (git-fixes).\n- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).\n- rtc: 88pm860x: fix possible race condition (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).\n- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).\n- s390/bpf: Fix multiple tail calls (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (git-fixes).\n- s390/stp: add locking to sysfs functions (git-fixes).\n- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).\n- scsi: lpfc: Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).\n- scsi: lpfc: Use generic power management (bsc#1164780).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: Remove unneeded break statements (bsc#1164780).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).\n- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).\n- SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: imx: gpc: fix power up sequencing (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: Fix memory leak on splited transfers (git-fixes).\n- spi: img-spfi: fix potential double release (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: pxa2xx: Add missed security checks (git-fixes).\n- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).\n- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: add missed clk_unprepare (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- splice: only read in as much information as there is pipe buffer space (bsc#1179520).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: add a missing dependency (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).\n- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).\n- staging: rtl8188eu: fix possible null dereference (git-fixes).\n- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).\n- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- sunrpc: fix copying of multiple pages in gss_read_proxy_verf() (bsc#1103992).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- sunrpc: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- sunrpc: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).\n- svcrdma: fix bounce buffers for unaligned offsets and multiple pages (bsc#1103992).\n- svcrdma: Fix page leak in svc_rdma_recv_read_chunk() (bsc#1103992).\n- tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control (bsc#1109837).\n- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).\n- timer: Fix wheel index calculation on last level (git fixes)\n- timer: Prevent base->clk from moving backward (git-fixes)\n- tty: always relink the port (git-fixes).\n- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).\n- tty: link tty and port before configuring it as console (git-fixes).\n- tty: synclink_gt: Adjust indentation in several functions (git-fixes).\n- tty: synclinkmp: Adjust indentation in several functions (git-fixes).\n- tty:serial:mvebu-uart:fix a wrong return (git-fixes).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).\n- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- usb: dwc2: Fix IN FIFO allocation (git-fixes).\n- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).\n- usb: fsl: Check memory resource before releasing it (git-fixes).\n- usb: gadget: composite: Fix possible double free memory bug (git-fixes).\n- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).\n- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).\n- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).\n- usb: gadget: fix wrong endpoint desc (git-fixes).\n- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).\n- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).\n- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).\n- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- usb: ldusb: use unsigned size format specifiers (git-fixes).\n- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).\n- usb: serial: digi_acceleport: clean up set_termios (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: digi_acceleport: remove in_interrupt() usage.\n- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).\n- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).\n- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: kl5kusb105: fix memleak on open (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: serial: option: fix Quectel BG96 matching (git-fixes).\n- usb: Skip endpoints with 0 maxpacket length (git-fixes).\n- usb: UAS: introduce a quirk to set no_write_same (git-fixes).\n- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).\n- vt: do not hardcode the mem allocation upper bound (git-fixes).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: da9062: do not ping the hw during stop() (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).\n- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).\n- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).\n- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-118,SUSE-SLE-Module-Basesystem-15-SP1-2021-118,SUSE-SLE-Module-Development-Tools-15-SP1-2021-118,SUSE-SLE-Module-Legacy-15-SP1-2021-118,SUSE-SLE-Module-Live-Patching-15-SP1-2021-118,SUSE-SLE-Product-HA-15-SP1-2021-118,SUSE-SLE-Product-WE-15-SP1-2021-118", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0118-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0118-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210118-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0118-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008197.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1050242", url: "https://bugzilla.suse.com/1050242", }, { category: "self", summary: "SUSE Bug 1050536", url: "https://bugzilla.suse.com/1050536", }, { category: "self", summary: "SUSE Bug 1050545", url: "https://bugzilla.suse.com/1050545", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1056653", url: "https://bugzilla.suse.com/1056653", }, { category: "self", summary: "SUSE Bug 1056657", url: "https://bugzilla.suse.com/1056657", }, { category: "self", summary: "SUSE Bug 1056787", url: "https://bugzilla.suse.com/1056787", }, { category: "self", summary: "SUSE Bug 1064802", url: "https://bugzilla.suse.com/1064802", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066129", url: "https://bugzilla.suse.com/1066129", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1103990", url: "https://bugzilla.suse.com/1103990", }, { category: "self", summary: "SUSE Bug 1103992", url: "https://bugzilla.suse.com/1103992", }, { category: "self", summary: "SUSE Bug 1104389", url: "https://bugzilla.suse.com/1104389", }, { category: "self", summary: "SUSE Bug 1104393", url: "https://bugzilla.suse.com/1104393", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1109837", url: "https://bugzilla.suse.com/1109837", }, { category: "self", summary: "SUSE Bug 1110096", url: "https://bugzilla.suse.com/1110096", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1112374", url: "https://bugzilla.suse.com/1112374", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1118657", url: "https://bugzilla.suse.com/1118657", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1136460", url: "https://bugzilla.suse.com/1136460", }, { category: "self", summary: "SUSE Bug 1136461", url: "https://bugzilla.suse.com/1136461", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1144912", url: "https://bugzilla.suse.com/1144912", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1164780", url: "https://bugzilla.suse.com/1164780", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172538", url: "https://bugzilla.suse.com/1172538", }, { category: "self", summary: "SUSE Bug 1172694", url: "https://bugzilla.suse.com/1172694", }, { category: "self", summary: "SUSE Bug 1174784", url: "https://bugzilla.suse.com/1174784", }, { category: "self", summary: "SUSE Bug 1174852", url: "https://bugzilla.suse.com/1174852", }, { category: "self", summary: "SUSE Bug 1176558", url: "https://bugzilla.suse.com/1176558", }, { category: "self", summary: "SUSE Bug 1176559", url: "https://bugzilla.suse.com/1176559", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178372", url: "https://bugzilla.suse.com/1178372", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179142", url: "https://bugzilla.suse.com/1179142", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179444", url: "https://bugzilla.suse.com/1179444", }, { category: "self", summary: "SUSE Bug 1179520", url: "https://bugzilla.suse.com/1179520", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179666", url: "https://bugzilla.suse.com/1179666", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1179724", url: "https://bugzilla.suse.com/1179724", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179810", url: "https://bugzilla.suse.com/1179810", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE CVE CVE-2018-20669 page", url: "https://www.suse.com/security/cve/CVE-2018-20669/", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-28374 page", url: "https://www.suse.com/security/cve/CVE-2020-28374/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-14T05:16:52Z", generator: { date: "2021-01-14T05:16:52Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0118-1", initial_release_date: "2021-01-14T05:16:52Z", revision_history: [ { date: "2021-01-14T05:16:52Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.78.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-197.78.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.78.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-197.78.1.aarch64", product_id: "dlm-kmp-default-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.78.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-197.78.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.78.1.aarch64", product: { name: "kernel-default-4.12.14-197.78.1.aarch64", product_id: "kernel-default-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.78.1.aarch64", product: { name: "kernel-default-base-4.12.14-197.78.1.aarch64", product_id: "kernel-default-base-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.78.1.aarch64", product: { name: "kernel-default-devel-4.12.14-197.78.1.aarch64", product_id: "kernel-default-devel-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.78.1.aarch64", product: { name: "kernel-default-extra-4.12.14-197.78.1.aarch64", product_id: "kernel-default-extra-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.78.1.aarch64", product: { name: "kernel-default-livepatch-4.12.14-197.78.1.aarch64", product_id: "kernel-default-livepatch-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.78.1.aarch64", product: { name: "kernel-default-livepatch-devel-4.12.14-197.78.1.aarch64", product_id: "kernel-default-livepatch-devel-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.78.1.aarch64", product: { name: "kernel-obs-build-4.12.14-197.78.1.aarch64", product_id: "kernel-obs-build-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.78.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-197.78.1.aarch64", product_id: "kernel-obs-qa-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.78.1.aarch64", product: { name: "kernel-syms-4.12.14-197.78.1.aarch64", product_id: "kernel-syms-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.78.1.aarch64", product: { name: "kernel-vanilla-4.12.14-197.78.1.aarch64", product_id: "kernel-vanilla-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.78.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-197.78.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.78.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-197.78.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.aarch64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.aarch64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.78.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-197.78.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.78.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-197.78.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-197.78.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.78.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-197.78.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-197.78.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-197.78.1.noarch", product: { name: "kernel-devel-4.12.14-197.78.1.noarch", product_id: "kernel-devel-4.12.14-197.78.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-197.78.1.noarch", product: { name: "kernel-docs-4.12.14-197.78.1.noarch", product_id: "kernel-docs-4.12.14-197.78.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-197.78.1.noarch", product: { name: "kernel-docs-html-4.12.14-197.78.1.noarch", product_id: "kernel-docs-html-4.12.14-197.78.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-197.78.1.noarch", product: { name: "kernel-macros-4.12.14-197.78.1.noarch", product_id: "kernel-macros-4.12.14-197.78.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-197.78.1.noarch", product: { name: "kernel-source-4.12.14-197.78.1.noarch", product_id: "kernel-source-4.12.14-197.78.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-197.78.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-197.78.1.noarch", product_id: "kernel-source-vanilla-4.12.14-197.78.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.78.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-197.78.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.78.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-197.78.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-197.78.1.ppc64le", product: { name: "kernel-debug-4.12.14-197.78.1.ppc64le", product_id: "kernel-debug-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-197.78.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-197.78.1.ppc64le", product_id: "kernel-debug-base-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-197.78.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-197.78.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-197.78.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-4.12.14-197.78.1.ppc64le", product_id: "kernel-debug-livepatch-devel-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.78.1.ppc64le", product: { name: "kernel-default-4.12.14-197.78.1.ppc64le", product_id: "kernel-default-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.78.1.ppc64le", product: { name: "kernel-default-base-4.12.14-197.78.1.ppc64le", product_id: "kernel-default-base-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.78.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-197.78.1.ppc64le", product_id: "kernel-default-devel-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.78.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-197.78.1.ppc64le", product_id: "kernel-default-extra-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.78.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-197.78.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", product: { name: "kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", product_id: "kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", product_id: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.78.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-197.78.1.ppc64le", product_id: "kernel-obs-build-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.78.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-197.78.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.78.1.ppc64le", product: { name: "kernel-syms-4.12.14-197.78.1.ppc64le", product_id: "kernel-syms-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.78.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-197.78.1.ppc64le", product_id: "kernel-vanilla-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.78.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-197.78.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.78.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-197.78.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.ppc64le", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.ppc64le", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.78.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-197.78.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.78.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-197.78.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.78.1.s390x", product: { name: "dlm-kmp-default-4.12.14-197.78.1.s390x", product_id: "dlm-kmp-default-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.78.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-197.78.1.s390x", product_id: "gfs2-kmp-default-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.78.1.s390x", product: { name: "kernel-default-4.12.14-197.78.1.s390x", product_id: "kernel-default-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.78.1.s390x", product: { name: "kernel-default-base-4.12.14-197.78.1.s390x", product_id: "kernel-default-base-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.78.1.s390x", product: { name: "kernel-default-devel-4.12.14-197.78.1.s390x", product_id: "kernel-default-devel-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.78.1.s390x", product: { name: "kernel-default-extra-4.12.14-197.78.1.s390x", product_id: "kernel-default-extra-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.78.1.s390x", product: { name: "kernel-default-livepatch-4.12.14-197.78.1.s390x", product_id: "kernel-default-livepatch-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.78.1.s390x", product: { name: "kernel-default-livepatch-devel-4.12.14-197.78.1.s390x", product_id: "kernel-default-livepatch-devel-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-197.78.1.s390x", product: { name: "kernel-default-man-4.12.14-197.78.1.s390x", product_id: "kernel-default-man-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.78.1.s390x", product: { name: "kernel-obs-build-4.12.14-197.78.1.s390x", product_id: "kernel-obs-build-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.78.1.s390x", product: { name: "kernel-obs-qa-4.12.14-197.78.1.s390x", product_id: "kernel-obs-qa-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.78.1.s390x", product: { name: "kernel-syms-4.12.14-197.78.1.s390x", product_id: "kernel-syms-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.78.1.s390x", product: { name: "kernel-vanilla-4.12.14-197.78.1.s390x", product_id: "kernel-vanilla-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.78.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-197.78.1.s390x", product_id: "kernel-vanilla-base-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.78.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-197.78.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.s390x", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.s390x", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-197.78.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-197.78.1.s390x", product_id: "kernel-zfcpdump-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-197.78.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-197.78.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.78.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-197.78.1.s390x", product_id: "kselftests-kmp-default-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.78.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-197.78.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-197.78.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.78.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-197.78.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-197.78.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-197.78.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-197.78.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-197.78.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-197.78.1.x86_64", product_id: "dlm-kmp-default-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-197.78.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-197.78.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-197.78.1.x86_64", product: { name: "kernel-debug-4.12.14-197.78.1.x86_64", product_id: "kernel-debug-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-197.78.1.x86_64", product: { name: "kernel-debug-base-4.12.14-197.78.1.x86_64", product_id: "kernel-debug-base-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-197.78.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-197.78.1.x86_64", product_id: "kernel-debug-devel-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-197.78.1.x86_64", product: { name: "kernel-debug-livepatch-devel-4.12.14-197.78.1.x86_64", product_id: "kernel-debug-livepatch-devel-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-197.78.1.x86_64", product: { name: "kernel-default-4.12.14-197.78.1.x86_64", product_id: "kernel-default-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-197.78.1.x86_64", product: { name: "kernel-default-base-4.12.14-197.78.1.x86_64", product_id: "kernel-default-base-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-197.78.1.x86_64", product: { name: "kernel-default-devel-4.12.14-197.78.1.x86_64", product_id: "kernel-default-devel-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-197.78.1.x86_64", product: { name: "kernel-default-extra-4.12.14-197.78.1.x86_64", product_id: "kernel-default-extra-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-197.78.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-197.78.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", product: { name: "kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", product_id: "kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-197.78.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-197.78.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-197.78.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-197.78.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-197.78.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-197.78.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-4.12.14-197.78.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-4.12.14-197.78.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", product: { name: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", product_id: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-197.78.1.x86_64", product: { name: "kernel-obs-build-4.12.14-197.78.1.x86_64", product_id: "kernel-obs-build-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-197.78.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-197.78.1.x86_64", product_id: "kernel-obs-qa-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-197.78.1.x86_64", product: { name: "kernel-syms-4.12.14-197.78.1.x86_64", product_id: "kernel-syms-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-197.78.1.x86_64", product: { name: "kernel-vanilla-4.12.14-197.78.1.x86_64", product_id: "kernel-vanilla-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-197.78.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-197.78.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-197.78.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-197.78.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.x86_64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.x86_64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-197.78.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-197.78.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-197.78.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-197.78.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-197.78.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-197.78.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-197.78.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-197.78.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product: { name: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-basesystem:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product: { name: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-development-tools:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Module for Legacy 15 SP1", product: { name: "SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-legacy:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15 SP1", product: { name: "SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15 SP1", product: { name: "SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Workstation Extension 15 SP1", product: { name: "SUSE Linux Enterprise Workstation Extension 15 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-we:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", }, product_reference: "kernel-default-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", }, product_reference: "kernel-default-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", }, product_reference: "kernel-default-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", }, product_reference: "kernel-default-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", }, product_reference: "kernel-default-base-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", }, product_reference: "kernel-default-man-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-197.78.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", }, product_reference: "kernel-devel-4.12.14-197.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-197.78.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1", product_id: "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", }, product_reference: "kernel-macros-4.12.14-197.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Basesystem 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-197.78.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", }, product_reference: "kernel-docs-4.12.14-197.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-197.78.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", }, product_reference: "kernel-source-4.12.14-197.78.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", }, product_reference: "kernel-syms-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", }, product_reference: "kernel-syms-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1", product_id: "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", }, product_reference: "kernel-syms-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Development Tools 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP1", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1", product_id: "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Legacy 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", }, product_reference: "kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", }, product_reference: "kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1", product_id: "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.78.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-197.78.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.78.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.78.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-197.78.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1", product_id: "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-extra-4.12.14-197.78.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1", product_id: "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", }, product_reference: "kernel-default-extra-4.12.14-197.78.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Workstation Extension 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2018-20669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2018-20669", }, ], notes: [ { category: "general", text: "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2018-20669", url: "https://www.suse.com/security/cve/CVE-2018-20669", }, { category: "external", summary: "SUSE Bug 1122971 for CVE-2018-20669", url: "https://bugzilla.suse.com/1122971", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2018-20669", }, { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-28374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28374", }, ], notes: [ { category: "general", text: "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28374", url: "https://www.suse.com/security/cve/CVE-2020-28374", }, { category: "external", summary: "SUSE Bug 1178372 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178372", }, { category: "external", summary: "SUSE Bug 1178684 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178684", }, { category: "external", summary: "SUSE Bug 1180676 for CVE-2020-28374", url: "https://bugzilla.suse.com/1180676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2020-28374", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_78-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.78.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.aarch64", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.ppc64le", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.s390x", "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.78.1.x86_64", "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.78.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T05:16:52Z", details: "moderate", }, ], title: "CVE-2020-4788", }, ], }
suse-su-2021:0094-1
Vulnerability from csaf_suse
Published
2021-01-12 18:14
Modified
2021-01-12 18:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
The following non-security bugs were fixed:
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: mcp251x: add error check when wq alloc failed (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- EDAC/i10nm: Use readl() to access MMIO registers (12sp5).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- kABI fix for g2d (git-fixes).
- kABI workaround for dsa/b53 changes (git-fixes).
- kABI workaround for net/ipvlan changes (git-fixes).
- kABI: ath10k: move a new structure member to the end (git-fixes).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- matroxfb: avoid -Warray-bounds warning (git-fixes).
- md/raid5: fix oops during stripe resizing (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- Move upstreamed bt fixes into sorted section
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
- net: aquantia: fix LRO with FCS error (git-fixes).
- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).
- net: dsa: b53: Ensure the default VID is untagged (git-fixes).
- net: dsa: b53: Fix default VLAN ID (git-fixes).
- net: dsa: b53: Properly account for VLAN filtering (git-fixes).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).
- net: dsa: qca8k: remove leftover phy accessors (git-fixes).
- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
- net: macb: add missing barriers when reading descriptors (git-fixes).
- net: macb: fix dropped RX frames due to a race (git-fixes).
- net: macb: fix error format in dev_err() (git-fixes).
- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).
- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).
- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
- net: stmmac: fix csr_clk can't be zero issue (git-fixes).
- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- ocfs2: fix unbalanced locking (bsc#1180506).
- ocfs2: initialize ip_next_orphan (bsc#1179724).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- phy: Revert toggling reset changes (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- ppp: remove the PPPIOCDETACH ioctl (git-fixes).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
- scsi: lpfc: Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
- scsi: lpfc: Use generic power management (bsc#1164780).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: Remove unneeded break statements (bsc#1164780).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: add a missing dependency (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).
- timer: Fix wheel index calculation on last level (git fixes)
- timer: Prevent base->clk from moving backward (git-fixes)
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).
- usb: serial: digi_acceleport: clean up set_termios (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: digi_acceleport: remove in_interrupt() usage.
- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).
- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).
- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1114648).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).
- xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames
SUSE-2021-94,SUSE-SLE-RT-12-SP5-2021-94
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: mcp251x: add error check when wq alloc failed (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- EDAC/i10nm: Use readl() to access MMIO registers (12sp5).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: trackpoint - add new trackpoint variant IDs (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- kABI fix for g2d (git-fixes).\n- kABI workaround for dsa/b53 changes (git-fixes).\n- kABI workaround for net/ipvlan changes (git-fixes).\n- kABI: ath10k: move a new structure member to the end (git-fixes).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- kgdb: Fix spurious true from in_dbg_master() (git-fixes).\n- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- matroxfb: avoid -Warray-bounds warning (git-fixes).\n- md/raid5: fix oops during stripe resizing (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- Move upstreamed bt fixes into sorted section\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).\n- net: aquantia: fix LRO with FCS error (git-fixes).\n- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).\n- net: dsa: b53: Ensure the default VID is untagged (git-fixes).\n- net: dsa: b53: Fix default VLAN ID (git-fixes).\n- net: dsa: b53: Properly account for VLAN filtering (git-fixes).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).\n- net: dsa: qca8k: remove leftover phy accessors (git-fixes).\n- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).\n- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).\n- net: macb: add missing barriers when reading descriptors (git-fixes).\n- net: macb: fix dropped RX frames due to a race (git-fixes).\n- net: macb: fix error format in dev_err() (git-fixes).\n- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).\n- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).\n- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).\n- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).\n- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).\n- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).\n- net: stmmac: fix csr_clk can't be zero issue (git-fixes).\n- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).\n- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- ocfs2: initialize ip_next_orphan (bsc#1179724).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- phy: Revert toggling reset changes (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- ppp: remove the PPPIOCDETACH ioctl (git-fixes).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).\n- scsi: lpfc: Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).\n- scsi: lpfc: Use generic power management (bsc#1164780).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: Remove unneeded break statements (bsc#1164780).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: add a missing dependency (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- SUNRPC: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).\n- timer: Fix wheel index calculation on last level (git fixes)\n- timer: Prevent base->clk from moving backward (git-fixes)\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).\n- usb: serial: digi_acceleport: clean up set_termios (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: digi_acceleport: remove in_interrupt() usage.\n- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).\n- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).\n- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).\n- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1114648).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-94,SUSE-SLE-RT-12-SP5-2021-94", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0094-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0094-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210094-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0094-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008188.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1114648", url: "https://bugzilla.suse.com/1114648", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1164780", url: "https://bugzilla.suse.com/1164780", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1172538", url: "https://bugzilla.suse.com/1172538", }, { category: "self", summary: "SUSE Bug 1172694", url: "https://bugzilla.suse.com/1172694", }, { category: "self", summary: "SUSE Bug 1174784", url: "https://bugzilla.suse.com/1174784", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179142", url: "https://bugzilla.suse.com/1179142", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179444", url: "https://bugzilla.suse.com/1179444", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1179724", url: "https://bugzilla.suse.com/1179724", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179810", url: "https://bugzilla.suse.com/1179810", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-12T18:14:19Z", generator: { date: "2021-01-12T18:14:19Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0094-1", initial_release_date: "2021-01-12T18:14:19Z", revision_history: [ { date: "2021-01-12T18:14:19Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-4.12.14-10.28.3.noarch", product: { name: "kernel-devel-rt-4.12.14-10.28.3.noarch", product_id: "kernel-devel-rt-4.12.14-10.28.3.noarch", }, }, { category: "product_version", name: "kernel-source-rt-4.12.14-10.28.3.noarch", product: { name: "kernel-source-rt-4.12.14-10.28.3.noarch", product_id: "kernel-source-rt-4.12.14-10.28.3.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", product: { name: "cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", product_id: "cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-4.12.14-10.28.3.x86_64", product: { name: "cluster-md-kmp-rt_debug-4.12.14-10.28.3.x86_64", product_id: "cluster-md-kmp-rt_debug-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-4.12.14-10.28.3.x86_64", product: { name: "dlm-kmp-rt-4.12.14-10.28.3.x86_64", product_id: "dlm-kmp-rt-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-4.12.14-10.28.3.x86_64", product: { name: "dlm-kmp-rt_debug-4.12.14-10.28.3.x86_64", product_id: "dlm-kmp-rt_debug-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-4.12.14-10.28.3.x86_64", product: { name: "gfs2-kmp-rt-4.12.14-10.28.3.x86_64", product_id: "gfs2-kmp-rt-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-4.12.14-10.28.3.x86_64", product: { name: "gfs2-kmp-rt_debug-4.12.14-10.28.3.x86_64", product_id: "gfs2-kmp-rt_debug-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt-4.12.14-10.28.3.x86_64", product_id: "kernel-rt-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt-base-4.12.14-10.28.3.x86_64", product_id: "kernel-rt-base-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt-devel-4.12.14-10.28.3.x86_64", product_id: "kernel-rt-devel-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt-extra-4.12.14-10.28.3.x86_64", product_id: "kernel-rt-extra-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt-kgraft-devel-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt-kgraft-devel-4.12.14-10.28.3.x86_64", product_id: "kernel-rt-kgraft-devel-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt_debug-4.12.14-10.28.3.x86_64", product_id: "kernel-rt_debug-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-base-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt_debug-base-4.12.14-10.28.3.x86_64", product_id: "kernel-rt_debug-base-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", product_id: "kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt_debug-extra-4.12.14-10.28.3.x86_64", product_id: "kernel-rt_debug-extra-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-kgraft-devel-4.12.14-10.28.3.x86_64", product: { name: "kernel-rt_debug-kgraft-devel-4.12.14-10.28.3.x86_64", product_id: "kernel-rt_debug-kgraft-devel-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-4.12.14-10.28.3.x86_64", product: { name: "kernel-syms-rt-4.12.14-10.28.3.x86_64", product_id: "kernel-syms-rt-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-4.12.14-10.28.3.x86_64", product: { name: "kselftests-kmp-rt-4.12.14-10.28.3.x86_64", product_id: "kselftests-kmp-rt-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-4.12.14-10.28.3.x86_64", product: { name: "kselftests-kmp-rt_debug-4.12.14-10.28.3.x86_64", product_id: "kselftests-kmp-rt_debug-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", product: { name: "ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", product_id: "ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-4.12.14-10.28.3.x86_64", product: { name: "ocfs2-kmp-rt_debug-4.12.14-10.28.3.x86_64", product_id: "ocfs2-kmp-rt_debug-4.12.14-10.28.3.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Real Time 12 SP5", product: { name: "SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5", product_identification_helper: { cpe: "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", }, product_reference: "cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", }, product_reference: "dlm-kmp-rt-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", }, product_reference: "gfs2-kmp-rt-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-4.12.14-10.28.3.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", }, product_reference: "kernel-devel-rt-4.12.14-10.28.3.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", }, product_reference: "kernel-rt-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", }, product_reference: "kernel-rt-base-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", }, product_reference: "kernel-rt-devel-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", }, product_reference: "kernel-rt_debug-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", }, product_reference: "kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-4.12.14-10.28.3.noarch as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", }, product_reference: "kernel-source-rt-4.12.14-10.28.3.noarch", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", }, product_reference: "kernel-syms-rt-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-4.12.14-10.28.3.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5", product_id: "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", }, product_reference: "ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Real Time 12 SP5", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:19Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:19Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:19Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:19Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:19Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:19Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:19Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.28.3.noarch", "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.28.3.x86_64", "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.28.3.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:19Z", details: "important", }, ], title: "CVE-2020-29661", }, ], }
suse-su-2021:0095-1
Vulnerability from csaf_suse
Published
2021-01-12 18:14
Modified
2021-01-12 18:14
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
The following non-security bugs were fixed:
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: timer: Limit max amount of slave instances (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
- ASoC: sti: fix possible sleep-in-atomic (git-fixes).
- ASoC: wm8904: fix regcache handling (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: fix backtrace on coredump (git-fixes).
- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- ath9k_htc: Discard undersized packets (git-fixes).
- ath9k_htc: Modify byte order for an error message (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).
- Bluetooth: Fix advertising duplicated flags (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: mcp251x: add error check when wq alloc failed (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- extcon: max77693: Fix modalias string (git-fixes).
- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).
- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
- gpio: max77620: Fixup debounce delays (git-fixes).
- gpio: max77620: Use correct unit for debounce times (git-fixes).
- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).
- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).
- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).
- gpiolib: fix up emulated open drain outputs (git-fixes).
- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: Improve Windows Precision Touchpad detection (git-fixes).
- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).
- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: max1027: Reset the device at probe time (git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio: fix center temperature of bmc150-accel-core (git-fixes).
- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).
- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).
- iio: srf04: fix wrong limitation in distance measuring (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- ipw2x00: Fix -Wcast-function-type (git-fixes).
- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- kABI workaround for dsa/b53 changes (git-fixes).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for net/ipvlan changes (git-fixes).
- kABI: ath10k: move a new structure member to the end (git-fixes).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: fix authentication with iwlwifi/mvm (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- matroxfb: avoid -Warray-bounds warning (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md/raid5: fix oops during stripe resizing (git-fixes).
- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).
- media: cec-funcs.h: add status_req checks (git-fixes).
- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
- media: i2c: ov2659: Fix missing 720p register config (git-fixes).
- media: i2c: ov2659: fix s_stream return value (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).
- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: si470x-i2c: add missed operations in remove (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).
- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- Move upstreamed bt fixes into sorted section
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
- net: aquantia: fix LRO with FCS error (git-fixes).
- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).
- net: dsa: b53: Ensure the default VID is untagged (git-fixes).
- net: dsa: b53: Fix default VLAN ID (git-fixes).
- net: dsa: b53: Properly account for VLAN filtering (git-fixes).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).
- net: dsa: qca8k: remove leftover phy accessors (git-fixes).
- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
- net: macb: add missing barriers when reading descriptors (git-fixes).
- net: macb: fix dropped RX frames due to a race (git-fixes).
- net: macb: fix error format in dev_err() (git-fixes).
- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).
- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
- net: phy: Avoid multiple suspends (git-fixes).
- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).
- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
- net: stmmac: fix csr_clk can't be zero issue (git-fixes).
- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
- net: usb: sr9800: fix uninitialized local variable (git-fixes).
- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- parport: load lowlevel driver if ports not found (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- phy: Revert toggling reset changes (git-fixes).
- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).
- PM: ACPI: Output correct message on target power state (git-fixes).
- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- ppp: remove the PPPIOCDETACH ioctl (git-fixes).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).
- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).
- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).
- remoteproc: Fix wrong rvring index computation (git-fixes).
- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
- rtc: 88pm860x: fix possible race condition (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).
- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
- scsi: lpfc: Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
- scsi: lpfc: Use generic power management (bsc#1164780).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: Remove unneeded break statements (bsc#1164780).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: imx: gpc: fix power up sequencing (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: img-spfi: fix potential double release (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: pxa2xx: Add missed security checks (git-fixes).
- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: add missed clk_unprepare (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: add a missing dependency (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).
- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
- staging: rtl8188eu: fix possible null dereference (git-fixes).
- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).
- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).
- timer: Fix wheel index calculation on last level (git fixes)
- timer: Prevent base->clk from moving backward (git-fixes)
- tty: always relink the port (git-fixes).
- tty: link tty and port before configuring it as console (git-fixes).
- tty: synclink_gt: Adjust indentation in several functions (git-fixes).
- tty: synclinkmp: Adjust indentation in several functions (git-fixes).
- tty:serial:mvebu-uart:fix a wrong return (git-fixes).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- usb: dwc2: Fix IN FIFO allocation (git-fixes).
- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
- usb: fsl: Check memory resource before releasing it (git-fixes).
- usb: gadget: composite: Fix possible double free memory bug (git-fixes).
- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).
- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
- usb: gadget: fix wrong endpoint desc (git-fixes).
- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: ldusb: use unsigned size format specifiers (git-fixes).
- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).
- usb: serial: digi_acceleport: clean up set_termios (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: digi_acceleport: remove in_interrupt() usage.
- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).
- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).
- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: Skip endpoints with 0 maxpacket length (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- vt: do not hardcode the mem allocation upper bound (git-fixes).
- vt: Reject zero-sized screen buffer size (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: da9062: do not ping the hw during stop() (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames
SUSE-2021-95,SUSE-SLE-Module-RT-15-SP1-2021-95
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP1 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).\n- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).\n- ALSA: ca0106: fix error code handling (git-fixes).\n- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).\n- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).\n- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).\n- ALSA: timer: Limit max amount of slave instances (git-fixes).\n- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).\n- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).\n- ASoC: sti: fix possible sleep-in-atomic (git-fixes).\n- ASoC: wm8904: fix regcache handling (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: fix backtrace on coredump (git-fixes).\n- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).\n- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- ath9k_htc: Discard undersized packets (git-fixes).\n- ath9k_htc: Modify byte order for an error message (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).\n- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).\n- Bluetooth: Fix advertising duplicated flags (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: mcp251x: add error check when wq alloc failed (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- extcon: max77693: Fix modalias string (git-fixes).\n- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).\n- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).\n- gpio: max77620: Fixup debounce delays (git-fixes).\n- gpio: max77620: Use correct unit for debounce times (git-fixes).\n- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).\n- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).\n- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).\n- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).\n- gpiolib: fix up emulated open drain outputs (git-fixes).\n- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).\n- HID: core: Correctly handle ReportSize being zero (git-fixes).\n- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: Improve Windows Precision Touchpad detection (git-fixes).\n- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).\n- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).\n- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).\n- i2c: i801: Fix resume bug (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- iio: adc: max1027: Reset the device at probe time (git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).\n- iio: fix center temperature of bmc150-accel-core (git-fixes).\n- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).\n- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).\n- iio: srf04: fix wrong limitation in distance measuring (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- Input: trackpoint - add new trackpoint variant IDs (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- ipw2x00: Fix -Wcast-function-type (git-fixes).\n- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- kABI workaround for dsa/b53 changes (git-fixes).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for net/ipvlan changes (git-fixes).\n- kABI: ath10k: move a new structure member to the end (git-fixes).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015). RPM_BUILD_ROOT is cleared before %%install. Do the unpack into RPM_BUILD_ROOT in %%install\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: fix authentication with iwlwifi/mvm (git-fixes).\n- mac80211: fix use of skb payload instead of header (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- matroxfb: avoid -Warray-bounds warning (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md/raid5: fix oops during stripe resizing (git-fixes).\n- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).\n- media: cec-funcs.h: add status_req checks (git-fixes).\n- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).\n- media: i2c: ov2659: Fix missing 720p register config (git-fixes).\n- media: i2c: ov2659: fix s_stream return value (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).\n- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: si470x-i2c: add missed operations in remove (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).\n- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).\n- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mei: protect mei_cl_mtu from null dereference (git-fixes).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- Move upstreamed bt fixes into sorted section\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).\n- net: aquantia: fix LRO with FCS error (git-fixes).\n- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).\n- net: dsa: b53: Ensure the default VID is untagged (git-fixes).\n- net: dsa: b53: Fix default VLAN ID (git-fixes).\n- net: dsa: b53: Properly account for VLAN filtering (git-fixes).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).\n- net: dsa: qca8k: remove leftover phy accessors (git-fixes).\n- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).\n- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).\n- net: macb: add missing barriers when reading descriptors (git-fixes).\n- net: macb: fix dropped RX frames due to a race (git-fixes).\n- net: macb: fix error format in dev_err() (git-fixes).\n- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes).\n- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).\n- net: phy: Avoid multiple suspends (git-fixes).\n- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).\n- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).\n- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).\n- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).\n- net: stmmac: fix csr_clk can't be zero issue (git-fixes).\n- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).\n- net: usb: sr9800: fix uninitialized local variable (git-fixes).\n- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nfc: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- parport: load lowlevel driver if ports not found (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- phy: Revert toggling reset changes (git-fixes).\n- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).\n- PM: ACPI: Output correct message on target power state (git-fixes).\n- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- ppp: remove the PPPIOCDETACH ioctl (git-fixes).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).\n- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).\n- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).\n- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).\n- remoteproc: Fix wrong rvring index computation (git-fixes).\n- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).\n- rtc: 88pm860x: fix possible race condition (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).\n- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).\n- scsi: lpfc: Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).\n- scsi: lpfc: Use generic power management (bsc#1164780).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: Remove unneeded break statements (bsc#1164780).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: imx: gpc: fix power up sequencing (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: Fix memory leak on splited transfers (git-fixes).\n- spi: img-spfi: fix potential double release (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: pxa2xx: Add missed security checks (git-fixes).\n- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).\n- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: add missed clk_unprepare (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: add a missing dependency (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).\n- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).\n- staging: rtl8188eu: fix possible null dereference (git-fixes).\n- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).\n- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- SUNRPC: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).\n- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).\n- timer: Fix wheel index calculation on last level (git fixes)\n- timer: Prevent base->clk from moving backward (git-fixes)\n- tty: always relink the port (git-fixes).\n- tty: link tty and port before configuring it as console (git-fixes).\n- tty: synclink_gt: Adjust indentation in several functions (git-fixes).\n- tty: synclinkmp: Adjust indentation in several functions (git-fixes).\n- tty:serial:mvebu-uart:fix a wrong return (git-fixes).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).\n- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- usb: dwc2: Fix IN FIFO allocation (git-fixes).\n- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).\n- usb: fsl: Check memory resource before releasing it (git-fixes).\n- usb: gadget: composite: Fix possible double free memory bug (git-fixes).\n- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).\n- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).\n- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).\n- usb: gadget: fix wrong endpoint desc (git-fixes).\n- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).\n- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).\n- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).\n- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- usb: ldusb: use unsigned size format specifiers (git-fixes).\n- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: clean up modem-control handling (git-fixes).\n- usb: serial: digi_acceleport: clean up set_termios (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: digi_acceleport: remove in_interrupt() usage.\n- usb: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).\n- usb: serial: digi_acceleport: rename tty flag variable (git-fixes).\n- usb: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: Skip endpoints with 0 maxpacket length (git-fixes).\n- usb: UAS: introduce a quirk to set no_write_same (git-fixes).\n- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).\n- vt: do not hardcode the mem allocation upper bound (git-fixes).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: da9062: do not ping the hw during stop() (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-95,SUSE-SLE-Module-RT-15-SP1-2021-95", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0095-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0095-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210095-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0095-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008189.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1144912", url: "https://bugzilla.suse.com/1144912", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1164780", url: "https://bugzilla.suse.com/1164780", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172538", url: "https://bugzilla.suse.com/1172538", }, { category: "self", summary: "SUSE Bug 1174784", url: "https://bugzilla.suse.com/1174784", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179142", url: "https://bugzilla.suse.com/1179142", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179444", url: "https://bugzilla.suse.com/1179444", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179810", url: "https://bugzilla.suse.com/1179810", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-12T18:14:55Z", generator: { date: "2021-01-12T18:14:55Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0095-1", initial_release_date: "2021-01-12T18:14:55Z", revision_history: [ { date: "2021-01-12T18:14:55Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-4.12.14-14.47.1.noarch", product: { name: "kernel-devel-rt-4.12.14-14.47.1.noarch", product_id: "kernel-devel-rt-4.12.14-14.47.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-4.12.14-14.47.1.noarch", product: { name: "kernel-source-rt-4.12.14-14.47.1.noarch", product_id: "kernel-source-rt-4.12.14-14.47.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", product: { name: "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", product_id: "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-4.12.14-14.47.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-4.12.14-14.47.1.x86_64", product_id: "cluster-md-kmp-rt_debug-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-4.12.14-14.47.1.x86_64", product: { name: "dlm-kmp-rt-4.12.14-14.47.1.x86_64", product_id: "dlm-kmp-rt-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-4.12.14-14.47.1.x86_64", product: { name: "dlm-kmp-rt_debug-4.12.14-14.47.1.x86_64", product_id: "dlm-kmp-rt_debug-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-4.12.14-14.47.1.x86_64", product: { name: "gfs2-kmp-rt-4.12.14-14.47.1.x86_64", product_id: "gfs2-kmp-rt-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64", product: { name: "gfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64", product_id: "gfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt-4.12.14-14.47.1.x86_64", product_id: "kernel-rt-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-base-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt-base-4.12.14-14.47.1.x86_64", product_id: "kernel-rt-base-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt-devel-4.12.14-14.47.1.x86_64", product_id: "kernel-rt-devel-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt-extra-4.12.14-14.47.1.x86_64", product_id: "kernel-rt-extra-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-livepatch-devel-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt-livepatch-devel-4.12.14-14.47.1.x86_64", product_id: "kernel-rt-livepatch-devel-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt_debug-4.12.14-14.47.1.x86_64", product_id: "kernel-rt_debug-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-base-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt_debug-base-4.12.14-14.47.1.x86_64", product_id: "kernel-rt_debug-base-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", product_id: "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt_debug-extra-4.12.14-14.47.1.x86_64", product_id: "kernel-rt_debug-extra-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-livepatch-devel-4.12.14-14.47.1.x86_64", product: { name: "kernel-rt_debug-livepatch-devel-4.12.14-14.47.1.x86_64", product_id: "kernel-rt_debug-livepatch-devel-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-4.12.14-14.47.1.x86_64", product: { name: "kernel-syms-rt-4.12.14-14.47.1.x86_64", product_id: "kernel-syms-rt-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-4.12.14-14.47.1.x86_64", product: { name: "kselftests-kmp-rt-4.12.14-14.47.1.x86_64", product_id: "kselftests-kmp-rt-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-4.12.14-14.47.1.x86_64", product: { name: "kselftests-kmp-rt_debug-4.12.14-14.47.1.x86_64", product_id: "kselftests-kmp-rt_debug-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", product: { name: "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", product_id: "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64", product_id: "ocfs2-kmp-rt_debug-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-4.12.14-14.47.1.x86_64", product: { name: "reiserfs-kmp-rt-4.12.14-14.47.1.x86_64", product_id: "reiserfs-kmp-rt-4.12.14-14.47.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-4.12.14-14.47.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-4.12.14-14.47.1.x86_64", product_id: "reiserfs-kmp-rt_debug-4.12.14-14.47.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Real Time Module 15 SP1", product: { name: "SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-rt:15:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", }, product_reference: "cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", }, product_reference: "dlm-kmp-rt-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", }, product_reference: "gfs2-kmp-rt-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-4.12.14-14.47.1.noarch as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", }, product_reference: "kernel-devel-rt-4.12.14-14.47.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", }, product_reference: "kernel-rt-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-base-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", }, product_reference: "kernel-rt-base-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", }, product_reference: "kernel-rt-devel-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", }, product_reference: "kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-4.12.14-14.47.1.noarch as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", }, product_reference: "kernel-source-rt-4.12.14-14.47.1.noarch", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", }, product_reference: "kernel-syms-rt-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64 as component of SUSE Real Time Module 15 SP1", product_id: "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", }, product_reference: "ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", relates_to_product_reference: "SUSE Real Time Module 15 SP1", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Real Time Module 15 SP1:cluster-md-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:dlm-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:gfs2-kmp-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-devel-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-base-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-rt_debug-devel-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:kernel-source-rt-4.12.14-14.47.1.noarch", "SUSE Real Time Module 15 SP1:kernel-syms-rt-4.12.14-14.47.1.x86_64", "SUSE Real Time Module 15 SP1:ocfs2-kmp-rt-4.12.14-14.47.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:14:55Z", details: "important", }, ], title: "CVE-2020-36158", }, ], }
suse-su-2021:0438-1
Vulnerability from csaf_suse
Published
2021-02-11 15:34
Modified
2021-02-11 15:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).
- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).
- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).
- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).
- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).
- CVE-2020-10781: A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable (bnc#1173074).
- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).
- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).
- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).
- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).
- CVE-2020-29371: An issue was discovered in romfs_dev_read in fs/romfs/storage.c where uninitialized memory leaks to userspace (bnc#1179429).
- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).
- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).
- CVE-2019-20806: Fixed a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service (bnc#1172199).
The following non-security bugs were fixed:
- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840 bsc#1179071).
- blk-mq: make sure that line break can be printed (bsc#1163840 bsc#1179071).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).
- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).
- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).
- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).
- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).
- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).
- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).
- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).
- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).
- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).
- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).
- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).
- net/x25: prevent a couple of overflows (bsc#1178590).
- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).
- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).
- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).
- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).
- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
Patchnames
SUSE-2021-438,SUSE-SLE-Module-Live-Patching-15-2021-438,SUSE-SLE-Product-HA-15-2021-438,SUSE-SLE-Product-HPC-15-2021-438,SUSE-SLE-Product-SLES-15-2021-438,SUSE-SLE-Product-SLES_SAP-15-2021-438
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3348: Fixed a use-after-free in nbd_add_socket that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup (bnc#1181504).\n- CVE-2021-3347: A use-after-free was discovered in the PI futexes during fault handling, allowing local users to execute code in the kernel (bnc#1181349).\n- CVE-2020-25211: Fixed a buffer overflow in ctnetlink_parse_tuple_filter() which could be triggered by a local attackers by injecting conntrack netlink configuration (bnc#1176395).\n- CVE-2020-27835: A use-after-free in the infiniband hfi1 driver was found, specifically in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-29569: Fixed a potential privilege escalation and information leaks related to the PV block backend, as used by Xen (bnc#1179509).\n- CVE-2020-29568: Fixed a denial of service issue, related to processing watch events (bnc#1179508).\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-4788: Fixed an issue with IBM Power9 processors could have allowed a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances (bsc#1177666).\n- CVE-2020-10781: A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable (bnc#1173074).\n- CVE-2020-15436: Fixed a use after free vulnerability in fs/block_dev.c which could have allowed local users to gain privileges or cause a denial of service (bsc#1179141).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-27777: Fixed a privilege escalation in the Run-Time Abstraction Services (RTAS) interface, affecting guests running on top of PowerVM or KVM hypervisors (bnc#1179107).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n- CVE-2020-28974: Fixed a slab-out-of-bounds read in fbcon which could have been used by local attackers to read privileged information or potentially crash the kernel (bsc#1178589).\n- CVE-2020-28915: Fixed a buffer over-read in the fbcon code which could have been used by local attackers to read kernel memory (bsc#1178886).\n- CVE-2020-28374: Fixed a Linux SCSI target issue (bsc#1178372).\n- CVE-2020-25669: Fixed a use-after-free read in sunkbd_reinit() (bsc#1178182).\n- CVE-2020-29371: An issue was discovered in romfs_dev_read in fs/romfs/storage.c where uninitialized memory leaks to userspace (bnc#1179429).\n- CVE-2020-15437: Fixed a null pointer dereference which could have allowed local users to cause a denial of service(bsc#1179140).\n- CVE-2020-36158: Fixed a potential remote code execution in the Marvell mwifiex driver (bsc#1180559).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2019-20934: Fixed a use-after-free in show_numa_stats() because NUMA fault statistics were inappropriately freed (bsc#1179663).\n- CVE-2019-20806: Fixed a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service (bnc#1172199).\n\nThe following non-security bugs were fixed:\n\n- blk-mq: avoid sysfs buffer overflow with too many CPU cores (bsc#1163840 bsc#1179071).\n- blk-mq: make sure that line break can be printed (bsc#1163840 bsc#1179071).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- futex: Do not enable IRQs unconditionally in put_pi_state() (bsc#1149032).\n- futex: Ensure the correct return value from futex_lock_pi() (bsc#1181349 bsc#1149032).\n- futex: Fix incorrect should_fail_futex() handling (bsc#1181349).\n- futex: Handle faults correctly for PI futexes (bsc#1181349 bsc#1149032).\n- futex: Provide and use pi_state_update_owner() (bsc#1181349 bsc#1149032).\n- futex: Replace pointless printk in fixup_owner() (bsc#1181349 bsc#1149032).\n- futex: Simplify fixup_pi_state_owner() (bsc#1181349 bsc#1149032).\n- futex: Use pi_state_update_owner() in put_pi_state() (bsc#1181349 bsc#1149032).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- iommu/vt-d: Do not dereference iommu_device if IOMMU_API is not built (bsc#1181001, jsc#ECO-3191).\n- iommu/vt-d: Gracefully handle DMAR units with no supported address widths (bsc#1181001, jsc#ECO-3191).\n- kABI: Fix kABI for extended APIC-ID support (bsc#1181001, jsc#ECO-3191).\n- locking/futex: Allow low-level atomic operations to return -EAGAIN (bsc#1149032).\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- rtmutex: Remove unused argument from rt_mutex_proxy_unlock() (bsc#1181349 bsc#1149032).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- scsi: iscsi: Fix a potential deadlock in the timeout handler (bsc#1178272).\n- x86/apic: Fix x2apic enablement without interrupt remapping (bsc#1181001, jsc#ECO-3191).\n- x86/apic: Support 15 bits of APIC ID in IOAPIC/MSI where available (bsc#1181001, jsc#ECO-3191).\n- x86/ioapic: Handle Extended Destination ID field in RTE (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Add KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/kvm: Reserve KVM_FEATURE_MSI_EXT_DEST_ID (bsc#1181001, jsc#ECO-3191).\n- x86/msi: Only use high bits of MSI address for DMAR unit (bsc#1181001, jsc#ECO-3191).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-438,SUSE-SLE-Module-Live-Patching-15-2021-438,SUSE-SLE-Product-HA-15-2021-438,SUSE-SLE-Product-HPC-15-2021-438,SUSE-SLE-Product-SLES-15-2021-438,SUSE-SLE-Product-SLES_SAP-15-2021-438", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0438-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0438-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210438-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0438-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008317.html", }, { category: "self", summary: "SUSE Bug 1144912", url: "https://bugzilla.suse.com/1144912", }, { category: "self", summary: "SUSE Bug 1149032", url: "https://bugzilla.suse.com/1149032", }, { category: "self", summary: "SUSE Bug 1163840", url: "https://bugzilla.suse.com/1163840", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1172199", url: "https://bugzilla.suse.com/1172199", }, { category: "self", summary: "SUSE Bug 1173074", url: "https://bugzilla.suse.com/1173074", }, { category: "self", summary: "SUSE Bug 1173942", url: "https://bugzilla.suse.com/1173942", }, { category: "self", summary: "SUSE Bug 1176395", url: "https://bugzilla.suse.com/1176395", }, { category: "self", summary: "SUSE Bug 1176846", url: "https://bugzilla.suse.com/1176846", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1178182", url: "https://bugzilla.suse.com/1178182", }, { category: "self", summary: "SUSE Bug 1178272", url: "https://bugzilla.suse.com/1178272", }, { category: "self", summary: "SUSE Bug 1178372", url: "https://bugzilla.suse.com/1178372", }, { category: "self", summary: "SUSE Bug 1178589", url: "https://bugzilla.suse.com/1178589", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178684", url: "https://bugzilla.suse.com/1178684", }, { category: "self", summary: "SUSE Bug 1178886", url: "https://bugzilla.suse.com/1178886", }, { category: "self", summary: "SUSE Bug 1179071", url: "https://bugzilla.suse.com/1179071", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179140", url: "https://bugzilla.suse.com/1179140", }, { category: "self", summary: "SUSE Bug 1179141", url: "https://bugzilla.suse.com/1179141", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179429", url: "https://bugzilla.suse.com/1179429", }, { category: "self", summary: "SUSE Bug 1179508", url: "https://bugzilla.suse.com/1179508", }, { category: "self", summary: "SUSE Bug 1179509", url: "https://bugzilla.suse.com/1179509", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179616", url: "https://bugzilla.suse.com/1179616", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179666", url: "https://bugzilla.suse.com/1179666", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179877", url: "https://bugzilla.suse.com/1179877", }, { category: "self", summary: "SUSE Bug 1179878", url: "https://bugzilla.suse.com/1179878", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179961", url: "https://bugzilla.suse.com/1179961", }, { category: "self", summary: "SUSE Bug 1180008", url: "https://bugzilla.suse.com/1180008", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180028", url: "https://bugzilla.suse.com/1180028", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180030", url: "https://bugzilla.suse.com/1180030", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180032", url: "https://bugzilla.suse.com/1180032", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180562", url: "https://bugzilla.suse.com/1180562", }, { category: "self", summary: "SUSE Bug 1180676", url: "https://bugzilla.suse.com/1180676", }, { category: "self", summary: "SUSE Bug 1181001", url: "https://bugzilla.suse.com/1181001", }, { category: "self", summary: "SUSE Bug 1181158", url: "https://bugzilla.suse.com/1181158", }, { category: "self", summary: "SUSE Bug 1181349", url: "https://bugzilla.suse.com/1181349", }, { category: "self", summary: "SUSE Bug 1181504", url: "https://bugzilla.suse.com/1181504", }, { category: "self", summary: "SUSE Bug 1181553", url: "https://bugzilla.suse.com/1181553", }, { category: "self", summary: "SUSE Bug 1181645", url: "https://bugzilla.suse.com/1181645", }, { category: "self", summary: "SUSE CVE CVE-2019-20806 page", url: "https://www.suse.com/security/cve/CVE-2019-20806/", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-10781 page", url: "https://www.suse.com/security/cve/CVE-2020-10781/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-15436 page", url: "https://www.suse.com/security/cve/CVE-2020-15436/", }, { category: "self", summary: "SUSE CVE CVE-2020-15437 page", url: "https://www.suse.com/security/cve/CVE-2020-15437/", }, { category: "self", summary: "SUSE CVE CVE-2020-25211 page", url: "https://www.suse.com/security/cve/CVE-2020-25211/", }, { category: "self", summary: "SUSE CVE CVE-2020-25639 page", url: "https://www.suse.com/security/cve/CVE-2020-25639/", }, { category: "self", summary: "SUSE CVE CVE-2020-25669 page", url: "https://www.suse.com/security/cve/CVE-2020-25669/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-27835 page", url: "https://www.suse.com/security/cve/CVE-2020-27835/", }, { category: "self", summary: "SUSE CVE CVE-2020-28374 page", url: "https://www.suse.com/security/cve/CVE-2020-28374/", }, { category: "self", summary: "SUSE CVE CVE-2020-28915 page", url: "https://www.suse.com/security/cve/CVE-2020-28915/", }, { category: "self", summary: "SUSE CVE CVE-2020-28974 page", url: "https://www.suse.com/security/cve/CVE-2020-28974/", }, { category: "self", summary: "SUSE CVE CVE-2020-29371 page", url: "https://www.suse.com/security/cve/CVE-2020-29371/", }, { category: "self", summary: "SUSE CVE CVE-2020-29568 page", url: "https://www.suse.com/security/cve/CVE-2020-29568/", }, { category: "self", summary: "SUSE CVE CVE-2020-29569 page", url: "https://www.suse.com/security/cve/CVE-2020-29569/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, { category: "self", summary: "SUSE CVE CVE-2021-3347 page", url: "https://www.suse.com/security/cve/CVE-2021-3347/", }, { category: "self", summary: "SUSE CVE CVE-2021-3348 page", url: "https://www.suse.com/security/cve/CVE-2021-3348/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-02-11T15:34:15Z", generator: { date: "2021-02-11T15:34:15Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0438-1", initial_release_date: "2021-02-11T15:34:15Z", revision_history: [ { date: "2021-02-11T15:34:15Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.66.1.aarch64", product: { name: "cluster-md-kmp-default-4.12.14-150.66.1.aarch64", product_id: "cluster-md-kmp-default-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.66.1.aarch64", product: { name: "dlm-kmp-default-4.12.14-150.66.1.aarch64", product_id: "dlm-kmp-default-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.66.1.aarch64", product: { name: "gfs2-kmp-default-4.12.14-150.66.1.aarch64", product_id: "gfs2-kmp-default-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.66.1.aarch64", product: { name: "kernel-default-4.12.14-150.66.1.aarch64", product_id: "kernel-default-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.66.1.aarch64", product: { name: "kernel-default-base-4.12.14-150.66.1.aarch64", product_id: "kernel-default-base-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.66.1.aarch64", product: { name: "kernel-default-devel-4.12.14-150.66.1.aarch64", product_id: "kernel-default-devel-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.66.1.aarch64", product: { name: "kernel-default-extra-4.12.14-150.66.1.aarch64", product_id: "kernel-default-extra-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.66.1.aarch64", product: { name: "kernel-default-livepatch-4.12.14-150.66.1.aarch64", product_id: "kernel-default-livepatch-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.66.1.aarch64", product: { name: "kernel-default-livepatch-devel-4.12.14-150.66.1.aarch64", product_id: "kernel-default-livepatch-devel-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.66.1.aarch64", product: { name: "kernel-obs-build-4.12.14-150.66.1.aarch64", product_id: "kernel-obs-build-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.66.1.aarch64", product: { name: "kernel-obs-qa-4.12.14-150.66.1.aarch64", product_id: "kernel-obs-qa-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.66.1.aarch64", product: { name: "kernel-syms-4.12.14-150.66.1.aarch64", product_id: "kernel-syms-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.66.1.aarch64", product: { name: "kernel-vanilla-4.12.14-150.66.1.aarch64", product_id: "kernel-vanilla-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.66.1.aarch64", product: { name: "kernel-vanilla-base-4.12.14-150.66.1.aarch64", product_id: "kernel-vanilla-base-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.66.1.aarch64", product: { name: "kernel-vanilla-devel-4.12.14-150.66.1.aarch64", product_id: "kernel-vanilla-devel-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.aarch64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.aarch64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.66.1.aarch64", product: { name: "kselftests-kmp-default-4.12.14-150.66.1.aarch64", product_id: "kselftests-kmp-default-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.66.1.aarch64", product: { name: "ocfs2-kmp-default-4.12.14-150.66.1.aarch64", product_id: "ocfs2-kmp-default-4.12.14-150.66.1.aarch64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.66.1.aarch64", product: { name: "reiserfs-kmp-default-4.12.14-150.66.1.aarch64", product_id: "reiserfs-kmp-default-4.12.14-150.66.1.aarch64", }, }, ], category: "architecture", name: "aarch64", }, { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-150.66.1.noarch", product: { name: "kernel-devel-4.12.14-150.66.1.noarch", product_id: "kernel-devel-4.12.14-150.66.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-150.66.1.noarch", product: { name: "kernel-docs-4.12.14-150.66.1.noarch", product_id: "kernel-docs-4.12.14-150.66.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-150.66.1.noarch", product: { name: "kernel-docs-html-4.12.14-150.66.1.noarch", product_id: "kernel-docs-html-4.12.14-150.66.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-150.66.1.noarch", product: { name: "kernel-macros-4.12.14-150.66.1.noarch", product_id: "kernel-macros-4.12.14-150.66.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-150.66.1.noarch", product: { name: "kernel-source-4.12.14-150.66.1.noarch", product_id: "kernel-source-4.12.14-150.66.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-150.66.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-150.66.1.noarch", product_id: "kernel-source-vanilla-4.12.14-150.66.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", product: { name: "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", product_id: "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.66.1.ppc64le", product: { name: "dlm-kmp-default-4.12.14-150.66.1.ppc64le", product_id: "dlm-kmp-default-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.66.1.ppc64le", product: { name: "gfs2-kmp-default-4.12.14-150.66.1.ppc64le", product_id: "gfs2-kmp-default-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-4.12.14-150.66.1.ppc64le", product: { name: "kernel-debug-4.12.14-150.66.1.ppc64le", product_id: "kernel-debug-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-150.66.1.ppc64le", product: { name: "kernel-debug-base-4.12.14-150.66.1.ppc64le", product_id: "kernel-debug-base-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-150.66.1.ppc64le", product: { name: "kernel-debug-devel-4.12.14-150.66.1.ppc64le", product_id: "kernel-debug-devel-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-150.66.1.ppc64le", product: { name: "kernel-debug-livepatch-devel-4.12.14-150.66.1.ppc64le", product_id: "kernel-debug-livepatch-devel-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.66.1.ppc64le", product: { name: "kernel-default-4.12.14-150.66.1.ppc64le", product_id: "kernel-default-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.66.1.ppc64le", product: { name: "kernel-default-base-4.12.14-150.66.1.ppc64le", product_id: "kernel-default-base-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.66.1.ppc64le", product: { name: "kernel-default-devel-4.12.14-150.66.1.ppc64le", product_id: "kernel-default-devel-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.66.1.ppc64le", product: { name: "kernel-default-extra-4.12.14-150.66.1.ppc64le", product_id: "kernel-default-extra-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.66.1.ppc64le", product: { name: "kernel-default-livepatch-4.12.14-150.66.1.ppc64le", product_id: "kernel-default-livepatch-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.66.1.ppc64le", product: { name: "kernel-default-livepatch-devel-4.12.14-150.66.1.ppc64le", product_id: "kernel-default-livepatch-devel-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", product: { name: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", product_id: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.66.1.ppc64le", product: { name: "kernel-obs-build-4.12.14-150.66.1.ppc64le", product_id: "kernel-obs-build-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.66.1.ppc64le", product: { name: "kernel-obs-qa-4.12.14-150.66.1.ppc64le", product_id: "kernel-obs-qa-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.66.1.ppc64le", product: { name: "kernel-syms-4.12.14-150.66.1.ppc64le", product_id: "kernel-syms-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.66.1.ppc64le", product: { name: "kernel-vanilla-4.12.14-150.66.1.ppc64le", product_id: "kernel-vanilla-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", product: { name: "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", product_id: "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.66.1.ppc64le", product: { name: "kernel-vanilla-devel-4.12.14-150.66.1.ppc64le", product_id: "kernel-vanilla-devel-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.ppc64le", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.ppc64le", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.66.1.ppc64le", product: { name: "kselftests-kmp-default-4.12.14-150.66.1.ppc64le", product_id: "kselftests-kmp-default-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", product: { name: "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", product_id: "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", product: { name: "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", product_id: "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", }, }, ], category: "architecture", name: "ppc64le", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.66.1.s390x", product: { name: "cluster-md-kmp-default-4.12.14-150.66.1.s390x", product_id: "cluster-md-kmp-default-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.66.1.s390x", product: { name: "dlm-kmp-default-4.12.14-150.66.1.s390x", product_id: "dlm-kmp-default-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.66.1.s390x", product: { name: "gfs2-kmp-default-4.12.14-150.66.1.s390x", product_id: "gfs2-kmp-default-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.66.1.s390x", product: { name: "kernel-default-4.12.14-150.66.1.s390x", product_id: "kernel-default-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.66.1.s390x", product: { name: "kernel-default-base-4.12.14-150.66.1.s390x", product_id: "kernel-default-base-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.66.1.s390x", product: { name: "kernel-default-devel-4.12.14-150.66.1.s390x", product_id: "kernel-default-devel-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.66.1.s390x", product: { name: "kernel-default-extra-4.12.14-150.66.1.s390x", product_id: "kernel-default-extra-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.66.1.s390x", product: { name: "kernel-default-livepatch-4.12.14-150.66.1.s390x", product_id: "kernel-default-livepatch-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.66.1.s390x", product: { name: "kernel-default-livepatch-devel-4.12.14-150.66.1.s390x", product_id: "kernel-default-livepatch-devel-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-default-man-4.12.14-150.66.1.s390x", product: { name: "kernel-default-man-4.12.14-150.66.1.s390x", product_id: "kernel-default-man-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.66.1.s390x", product: { name: "kernel-obs-build-4.12.14-150.66.1.s390x", product_id: "kernel-obs-build-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.66.1.s390x", product: { name: "kernel-obs-qa-4.12.14-150.66.1.s390x", product_id: "kernel-obs-qa-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.66.1.s390x", product: { name: "kernel-syms-4.12.14-150.66.1.s390x", product_id: "kernel-syms-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.66.1.s390x", product: { name: "kernel-vanilla-4.12.14-150.66.1.s390x", product_id: "kernel-vanilla-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.66.1.s390x", product: { name: "kernel-vanilla-base-4.12.14-150.66.1.s390x", product_id: "kernel-vanilla-base-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.66.1.s390x", product: { name: "kernel-vanilla-devel-4.12.14-150.66.1.s390x", product_id: "kernel-vanilla-devel-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.s390x", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.s390x", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-4.12.14-150.66.1.s390x", product: { name: "kernel-zfcpdump-4.12.14-150.66.1.s390x", product_id: "kernel-zfcpdump-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kernel-zfcpdump-man-4.12.14-150.66.1.s390x", product: { name: "kernel-zfcpdump-man-4.12.14-150.66.1.s390x", product_id: "kernel-zfcpdump-man-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.66.1.s390x", product: { name: "kselftests-kmp-default-4.12.14-150.66.1.s390x", product_id: "kselftests-kmp-default-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.66.1.s390x", product: { name: "ocfs2-kmp-default-4.12.14-150.66.1.s390x", product_id: "ocfs2-kmp-default-4.12.14-150.66.1.s390x", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.66.1.s390x", product: { name: "reiserfs-kmp-default-4.12.14-150.66.1.s390x", product_id: "reiserfs-kmp-default-4.12.14-150.66.1.s390x", }, }, ], category: "architecture", name: "s390x", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-default-4.12.14-150.66.1.x86_64", product: { name: "cluster-md-kmp-default-4.12.14-150.66.1.x86_64", product_id: "cluster-md-kmp-default-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-default-4.12.14-150.66.1.x86_64", product: { name: "dlm-kmp-default-4.12.14-150.66.1.x86_64", product_id: "dlm-kmp-default-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-default-4.12.14-150.66.1.x86_64", product: { name: "gfs2-kmp-default-4.12.14-150.66.1.x86_64", product_id: "gfs2-kmp-default-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-4.12.14-150.66.1.x86_64", product: { name: "kernel-debug-4.12.14-150.66.1.x86_64", product_id: "kernel-debug-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-150.66.1.x86_64", product: { name: "kernel-debug-base-4.12.14-150.66.1.x86_64", product_id: "kernel-debug-base-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-150.66.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-150.66.1.x86_64", product_id: "kernel-debug-devel-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-livepatch-devel-4.12.14-150.66.1.x86_64", product: { name: "kernel-debug-livepatch-devel-4.12.14-150.66.1.x86_64", product_id: "kernel-debug-livepatch-devel-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-150.66.1.x86_64", product: { name: "kernel-default-4.12.14-150.66.1.x86_64", product_id: "kernel-default-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-150.66.1.x86_64", product: { name: "kernel-default-base-4.12.14-150.66.1.x86_64", product_id: "kernel-default-base-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-150.66.1.x86_64", product: { name: "kernel-default-devel-4.12.14-150.66.1.x86_64", product_id: "kernel-default-devel-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-extra-4.12.14-150.66.1.x86_64", product: { name: "kernel-default-extra-4.12.14-150.66.1.x86_64", product_id: "kernel-default-extra-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-4.12.14-150.66.1.x86_64", product: { name: "kernel-default-livepatch-4.12.14-150.66.1.x86_64", product_id: "kernel-default-livepatch-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-default-livepatch-devel-4.12.14-150.66.1.x86_64", product: { name: "kernel-default-livepatch-devel-4.12.14-150.66.1.x86_64", product_id: "kernel-default-livepatch-devel-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-150.66.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-150.66.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-150.66.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-150.66.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-150.66.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-150.66.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-livepatch-devel-4.12.14-150.66.1.x86_64", product: { name: "kernel-kvmsmall-livepatch-devel-4.12.14-150.66.1.x86_64", product_id: "kernel-kvmsmall-livepatch-devel-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", product: { name: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", product_id: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-150.66.1.x86_64", product: { name: "kernel-obs-build-4.12.14-150.66.1.x86_64", product_id: "kernel-obs-build-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-150.66.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-150.66.1.x86_64", product_id: "kernel-obs-qa-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-150.66.1.x86_64", product: { name: "kernel-syms-4.12.14-150.66.1.x86_64", product_id: "kernel-syms-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-150.66.1.x86_64", product: { name: "kernel-vanilla-4.12.14-150.66.1.x86_64", product_id: "kernel-vanilla-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-150.66.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-150.66.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-150.66.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-150.66.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.x86_64", product: { name: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.x86_64", product_id: "kernel-vanilla-livepatch-devel-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-default-4.12.14-150.66.1.x86_64", product: { name: "kselftests-kmp-default-4.12.14-150.66.1.x86_64", product_id: "kselftests-kmp-default-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-default-4.12.14-150.66.1.x86_64", product: { name: "ocfs2-kmp-default-4.12.14-150.66.1.x86_64", product_id: "ocfs2-kmp-default-4.12.14-150.66.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", product: { name: "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", product_id: "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Live Patching 15", product: { name: "SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-live-patching:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Availability Extension 15", product: { name: "SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15", product_identification_helper: { cpe: "cpe:/o:suse:sle-ha:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-espos:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product: { name: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sle_hpc-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 15-LTSS", product: { name: "SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:15", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 15", product: { name: "SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:15", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-default-livepatch-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-livepatch-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-livepatch-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", }, product_reference: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15", product_id: "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", }, product_reference: "kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Live Patching 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", }, product_reference: "cluster-md-kmp-default-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", }, product_reference: "cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", }, product_reference: "cluster-md-kmp-default-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", }, product_reference: "cluster-md-kmp-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", }, product_reference: "dlm-kmp-default-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", }, product_reference: "dlm-kmp-default-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", }, product_reference: "dlm-kmp-default-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", }, product_reference: "dlm-kmp-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", }, product_reference: "gfs2-kmp-default-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", }, product_reference: "gfs2-kmp-default-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", }, product_reference: "gfs2-kmp-default-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", }, product_reference: "gfs2-kmp-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", }, product_reference: "ocfs2-kmp-default-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", }, product_reference: "ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", }, product_reference: "ocfs2-kmp-default-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", product_id: "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", }, product_reference: "ocfs2-kmp-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Availability Extension 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", }, product_reference: "kernel-source-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS", product_id: "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-ESPOS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", }, product_reference: "kernel-source-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS", product_id: "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise High Performance Computing 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-default-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", }, product_reference: "kernel-default-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-base-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", }, product_reference: "kernel-default-base-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-man-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", }, product_reference: "kernel-default-man-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", }, product_reference: "kernel-source-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-syms-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", }, product_reference: "kernel-syms-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.66.1.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", }, product_reference: "reiserfs-kmp-default-4.12.14-150.66.1.aarch64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.66.1.s390x as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", }, product_reference: "reiserfs-kmp-default-4.12.14-150.66.1.s390x", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS", product_id: "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 15-LTSS", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-default-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-default-base-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", }, product_reference: "kernel-devel-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", }, product_reference: "kernel-docs-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", }, product_reference: "kernel-macros-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-150.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", }, product_reference: "kernel-source-4.12.14-150.66.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-syms-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-syms-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", }, product_reference: "reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-default-4.12.14-150.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15", product_id: "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", }, product_reference: "reiserfs-kmp-default-4.12.14-150.66.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 15", }, ], }, vulnerabilities: [ { cve: "CVE-2019-20806", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20806", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2. There is a NULL pointer dereference in tw5864_handle_frame() in drivers/media/pci/tw5864/tw5864-video.c, which may cause denial of service, aka CID-2e7682ebfc75.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20806", url: "https://www.suse.com/security/cve/CVE-2019-20806", }, { category: "external", summary: "SUSE Bug 1172199 for CVE-2019-20806", url: "https://bugzilla.suse.com/1172199", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "low", }, ], title: "CVE-2019-20806", }, { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-10781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10781", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10781", url: "https://www.suse.com/security/cve/CVE-2020-10781", }, { category: "external", summary: "SUSE Bug 1173074 for CVE-2020-10781", url: "https://bugzilla.suse.com/1173074", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-10781", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-15436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15436", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15436", url: "https://www.suse.com/security/cve/CVE-2020-15436", }, { category: "external", summary: "SUSE Bug 1179141 for CVE-2020-15436", url: "https://bugzilla.suse.com/1179141", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-15436", }, { cve: "CVE-2020-15437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15437", }, ], notes: [ { category: "general", text: "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15437", url: "https://www.suse.com/security/cve/CVE-2020-15437", }, { category: "external", summary: "SUSE Bug 1179140 for CVE-2020-15437", url: "https://bugzilla.suse.com/1179140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-15437", }, { cve: "CVE-2020-25211", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25211", }, ], notes: [ { category: "general", text: "In the Linux kernel through 5.8.7, local attackers able to inject conntrack netlink configuration could overflow a local buffer, causing crashes or triggering use of incorrect protocol numbers in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c, aka CID-1cc5ef91d2ff.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25211", url: "https://www.suse.com/security/cve/CVE-2020-25211", }, { category: "external", summary: "SUSE Bug 1176395 for CVE-2020-25211", url: "https://bugzilla.suse.com/1176395", }, { category: "external", summary: "SUSE Bug 1192356 for CVE-2020-25211", url: "https://bugzilla.suse.com/1192356", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-25211", }, { cve: "CVE-2020-25639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25639", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25639", url: "https://www.suse.com/security/cve/CVE-2020-25639", }, { category: "external", summary: "SUSE Bug 1176846 for CVE-2020-25639", url: "https://bugzilla.suse.com/1176846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-25639", }, { cve: "CVE-2020-25669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25669", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25669", url: "https://www.suse.com/security/cve/CVE-2020-25669", }, { category: "external", summary: "SUSE Bug 1178182 for CVE-2020-25669", url: "https://bugzilla.suse.com/1178182", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-25669", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-27835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27835", }, ], notes: [ { category: "general", text: "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27835", url: "https://www.suse.com/security/cve/CVE-2020-27835", }, { category: "external", summary: "SUSE Bug 1179878 for CVE-2020-27835", url: "https://bugzilla.suse.com/1179878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-27835", }, { cve: "CVE-2020-28374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28374", }, ], notes: [ { category: "general", text: "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28374", url: "https://www.suse.com/security/cve/CVE-2020-28374", }, { category: "external", summary: "SUSE Bug 1178372 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178372", }, { category: "external", summary: "SUSE Bug 1178684 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178684", }, { category: "external", summary: "SUSE Bug 1180676 for CVE-2020-28374", url: "https://bugzilla.suse.com/1180676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-28374", }, { cve: "CVE-2020-28915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28915", }, ], notes: [ { category: "general", text: "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28915", url: "https://www.suse.com/security/cve/CVE-2020-28915", }, { category: "external", summary: "SUSE Bug 1178886 for CVE-2020-28915", url: "https://bugzilla.suse.com/1178886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-28915", }, { cve: "CVE-2020-28974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28974", }, ], notes: [ { category: "general", text: "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28974", url: "https://www.suse.com/security/cve/CVE-2020-28974", }, { category: "external", summary: "SUSE Bug 1178589 for CVE-2020-28974", url: "https://bugzilla.suse.com/1178589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-28974", }, { cve: "CVE-2020-29371", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29371", }, ], notes: [ { category: "general", text: "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29371", url: "https://www.suse.com/security/cve/CVE-2020-29371", }, { category: "external", summary: "SUSE Bug 1179429 for CVE-2020-29371", url: "https://bugzilla.suse.com/1179429", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "low", }, ], title: "CVE-2020-29371", }, { cve: "CVE-2020-29568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29568", }, ], notes: [ { category: "general", text: "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29568", url: "https://www.suse.com/security/cve/CVE-2020-29568", }, { category: "external", summary: "SUSE Bug 1179508 for CVE-2020-29568", url: "https://bugzilla.suse.com/1179508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-29568", }, { cve: "CVE-2020-29569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29569", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29569", url: "https://www.suse.com/security/cve/CVE-2020-29569", }, { category: "external", summary: "SUSE Bug 1179509 for CVE-2020-29569", url: "https://bugzilla.suse.com/1179509", }, { category: "external", summary: "SUSE Bug 1180008 for CVE-2020-29569", url: "https://bugzilla.suse.com/1180008", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-29569", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2020-4788", }, { cve: "CVE-2021-3347", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3347", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.11. PI futexes have a kernel stack use-after-free during fault handling, allowing local users to execute code in the kernel, aka CID-34b1a1ce1458.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3347", url: "https://www.suse.com/security/cve/CVE-2021-3347", }, { category: "external", summary: "SUSE Bug 1181349 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181349", }, { category: "external", summary: "SUSE Bug 1181553 for CVE-2021-3347", url: "https://bugzilla.suse.com/1181553", }, { category: "external", summary: "SUSE Bug 1190859 for CVE-2021-3347", url: "https://bugzilla.suse.com/1190859", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "important", }, ], title: "CVE-2021-3347", }, { cve: "CVE-2021-3348", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2021-3348", }, ], notes: [ { category: "general", text: "nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2021-3348", url: "https://www.suse.com/security/cve/CVE-2021-3348", }, { category: "external", summary: "SUSE Bug 1181504 for CVE-2021-3348", url: "https://bugzilla.suse.com/1181504", }, { category: "external", summary: "SUSE Bug 1181645 for CVE-2021-3348", url: "https://bugzilla.suse.com/1181645", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_66-default-1-1.3.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.aarch64", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.s390x", "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150.66.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-11T15:34:15Z", details: "moderate", }, ], title: "CVE-2021-3348", }, ], }
suse-su-2021:0096-1
Vulnerability from csaf_suse
Published
2021-01-12 18:15
Modified
2021-01-12 18:15
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).
- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).
- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).
- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).
- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).
- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).
- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).
- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).
- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).
- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).
- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).
- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).
The following non-security bugs were fixed:
- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489)
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472)
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489)
- drm/i915: Fix sha_text population code (bsc#1152489)
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472)
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489)
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472)
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472)
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489)
- drm/vkms: fix xrgb on compute crc (bsc#1152472)
- drm: mxsfb: check framebuffer pitch (bsc#1152472)
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472)
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472)
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head->lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: do not protect ns mutation with ns->head->lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl->sd_flags() (git-fixes)
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address & portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix ->session locking (bsc#1179745).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- usb: serial: ch341: add new Product ID for CH341A (git-fixes).
- usb: serial: ch341: sort device-id entries (git-fixes).
- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- usb: serial: keyspan_pda: fix stalled writes (git-fixes).
- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- usb: serial: keyspan_pda: fix write deadlock (git-fixes).
- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).
- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- usb: serial: kl5kusb105: fix memleak on open (git-fixes).
- usb: serial: mos7720: fix parallel-port state restore (git-fixes).
- usb: serial: option: add Fibocom NL668 variants (git-fixes).
- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).
- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- usb: serial: option: fix Quectel BG96 matching (git-fixes).
- usb: UAS: introduce a quirk to set no_write_same (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
Patchnames
SUSE-2021-96,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-96
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\nThe SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-0444: Fixed a bad kfree due to a logic error in audit_data_to_entry (bnc#1180027).\n- CVE-2020-0465: Fixed multiple missing bounds checks in hid-multitouch.c that could have led to local privilege escalation (bnc#1180029).\n- CVE-2020-0466: Fixed a use-after-free due to a logic error in do_epoll_ctl and ep_loop_check_proc of eventpoll.c (bnc#1180031).\n- CVE-2020-11668: Fixed the mishandling of invalid descriptors in the Xirlink camera USB driver (bnc#1168952).\n- CVE-2020-27068: Fixed an out-of-bounds read due to a missing bounds check in the nl80211_policy policy of nl80211.c (bnc#1180086).\n- CVE-2020-27786: Fixed an out-of-bounds write in the MIDI implementation (bnc#1179601).\n- CVE-2020-27825: Fixed a race in the trace_open and buffer resize calls (bsc#1179960).\n- CVE-2020-27830: Fixed a null pointer dereference in speakup (bsc#1179656).\n- CVE-2020-29370: Fixed a race condition in kmem_cache_alloc_bulk (bnc#1179435).\n- CVE-2020-29373: Fixed an unsafe handling of the root directory during path lookups in fs/io_uring.c (bnc#1179434).\n- CVE-2020-29660: Fixed a locking inconsistency in the tty subsystem that may have allowed a read-after-free attack against TIOCGSID (bnc#1179745).\n- CVE-2020-29661: Fixed a locking issue in the tty subsystem that allowed a use-after-free attack against TIOCSPGRP (bsc#1179745).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).\n- ALSA: core: memalloc: add page alignment for iram (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).\n- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).\n- ALSA: hda/proc - print DP-MST connections (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).\n- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).\n- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).\n- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).\n- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).\n- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).\n- ALSA: seq: remove useless function (git-fixes).\n- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).\n- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).\n- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).\n- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).\n- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).\n- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).\n- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).\n- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).\n- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).\n- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).\n- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).\n- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).\n- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).\n- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).\n- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).\n- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).\n- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).\n- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).\n- ALSA: usb-audio: Drop debug.h (bsc#1178203).\n- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).\n- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).\n- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).\n- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).\n- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).\n- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).\n- ALSA: usb-audio: Improve some debug prints (bsc#1178203).\n- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).\n- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).\n- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).\n- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).\n- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).\n- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).\n- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).\n- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).\n- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).\n- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).\n- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).\n- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).\n- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).\n- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).\n- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).\n- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).\n- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).\n- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).\n- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).\n- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).\n- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).\n- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).\n- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).\n- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).\n- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).\n- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).\n- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).\n- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: meson: fix COMPILE_TEST error (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).\n- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).\n- ASoC: tegra20-spdif: remove 'default m' (git-fixes).\n- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- batman-adv: Consider fragmentation for needed_headroom (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- batman-adv: Reserve needed_*room for fragments (git-fixes).\n- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).\n- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).\n- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).\n- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).\n- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).\n- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).\n- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).\n- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: c_can: c_can_power_up(): fix error handling (git-fixes).\n- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).\n- cifs: do not share tcons with DFS (bsc#1178270).\n- cifs: document and cleanup dfs mount (bsc#1178270).\n- cifs: ensure correct super block for DFS reconnect (bsc#1178270).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).\n- cifs: fix double free error on share and prefix (bsc#1178270).\n- cifs: fix leaked reference on requeued write (bsc#1178270).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).\n- cifs: rename reconn_inval_dfs_target() (bsc#1178270).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).\n- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).\n- clk: ingenic: Fix divider calculation with div tables (git-fixes).\n- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Do not return 0 on failure (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).\n- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).\n- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).\n- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).\n- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).\n- coredump: fix core_pattern parse error (git-fixes).\n- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).\n- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).\n- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).\n- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).\n- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)\n- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489)\n- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)\n- drm/gma500: fix error check (bsc#1152472)\n- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489)\n- drm/i915: Fix sha_text population code (bsc#1152489)\n- drm/imx: tve remove extraneous type qualifier (bsc#1152489)\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)\n- drm/mediatek: Add missing put_device() call in (bsc#1152472)\n- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472)\n- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)\n- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489)\n- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)\n- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472)\n- drm/radeon: Prefer lower feedback dividers (bsc#1152489)\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)\n- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)\n- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472)\n- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489)\n- drm/vkms: fix xrgb on compute crc (bsc#1152472)\n- drm: mxsfb: check framebuffer pitch (bsc#1152472)\n- drm: mxsfb: Remove fbdev leftovers (bsc#1152472)\n- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)\n- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472)\n- drm: rcar-du: Put reference to VSP device (bsc#1152489)\n- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).\n- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).\n- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ethtool: fix error handling in ethtool_phys_id (git-fixes).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fail_function: Remove a redundant mutex unlock (bsc#1149032).\n- fbcon: Remove the superfluous break (bsc#1152472)\n- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- fs/minix: check return value of sb_getblk() (bsc#1179676).\n- fs/minix: do not allow getting deleted inodes (bsc#1179677).\n- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).\n- fs/minix: reject too-large maximum file size (bsc#1179678).\n- fs/minix: remove expected error message in block_to_path() (bsc#1179681).\n- fs/minix: set s_maxbytes correctly (bsc#1179679).\n- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).\n- geneve: pull IP header before ECN decapsulation (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).\n- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).\n- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).\n- HID: add support for Sega Saturn (git-fixes).\n- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).\n- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).\n- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).\n- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).\n- HMAT: Register memory-side cache after parsing (bsc#1178660).\n- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).\n- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)\n- IB/mlx4: Add and improve logging (bsc#1152489)\n- IB/mlx4: Add support for MRA (bsc#1152489)\n- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)\n- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)\n- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)\n- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)\n- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)\n- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).\n- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- iomap: Clear page error before beginning a write (bsc#1179683).\n- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).\n- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).\n- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: hook up missing RX handlers (git-fixes).\n- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for USB audio driver (bsc#1178203).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).\n- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).\n- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).\n- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: imx214: Fix stop streaming (git-fixes).\n- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).\n- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).\n- media: ipu3-cio2: Return actual subdev format (git-fixes).\n- media: ipu3-cio2: Serialise access to pad format (git-fixes).\n- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).\n- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: tm6000: Fix sizeof() mismatches (git-fixes).\n- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).\n- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).\n- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).\n- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).\n- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).\n- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).\n- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).\n- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).\n- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).\n- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).\n- mtd: spinand: Fix OOB read (git-fixes).\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nvme-fabrics: allow to queue requests for live queues (git-fixes).\n- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).\n- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).\n- nvme-fc: cancel async events before freeing event struct (git-fixes).\n- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).\n- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).\n- nvme-fc: fix io timeout to abort I/O (bsc#1177326).\n- nvme-fc: remove err_work work item (bsc#1177326).\n- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).\n- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).\n- nvme-fc: track error_recovery while connecting (bsc#1177326).\n- nvme-fc: wait for queues to freeze before calling (git-fixes).\n- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).\n- nvme-multipath: fix deadlock due to head->lock (git-fixes).\n- nvme-pci: properly print controller address (git-fixes).\n- nvme-rdma: avoid race between time out and tear down (bsc#1179519).\n- nvme-rdma: avoid repeated request completion (bsc#1179519).\n- nvme-rdma: cancel async events before freeing event struct (git-fixes).\n- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).\n- nvme-rdma: fix timeout handler (bsc#1179519).\n- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).\n- nvme-rdma: serialize controller teardown sequences (bsc#1179519).\n- nvme-tcp: avoid race between time out and tear down (bsc#1179519).\n- nvme-tcp: avoid repeated request completion (bsc#1179519).\n- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).\n- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).\n- nvme-tcp: cancel async events before freeing event struct (git-fixes).\n- nvme-tcp: do not poll a non-live queue (bsc#1179519).\n- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).\n- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).\n- nvme-tcp: fix possible leakage during error flow (git-fixes).\n- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).\n- nvme-tcp: fix timeout handler (bsc#1179519).\n- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).\n- nvme-tcp: leverage request plugging (bsc#1179519).\n- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).\n- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).\n- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).\n- nvme-tcp: serialize controller teardown sequences (bsc#1179519).\n- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).\n- nvme-tcp: try to send request in queue_rq context (bsc#1179519).\n- nvme-tcp: use bh_lock in data_ready (bsc#1179519).\n- nvme: do not protect ns mutation with ns->head->lock (git-fixes).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).\n- nvme: introduce nvme_sync_io_queues (bsc#1179519).\n- nvme: Revert: Fix controller creation races with teardown (git-fixes).\n- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).\n- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).\n- PCI: Fix overflow in command-line resource alignment requests (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- PCI: iproc: Fix out-of-bound array accesses (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).\n- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).\n- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).\n- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).\n- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).\n- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- pwm: zx: Add missing cleanup in error path (git-fixes).\n- qede: Notify qedr when mtu has changed (bsc#1152489)\n- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)\n- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)\n- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)\n- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)\n- RDMA/core: Fix reported speed and width (bsc#1152489)\n- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)\n- RDMA/core: Free DIM memory in error unwind (bsc#1152489)\n- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)\n- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)\n- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)\n- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)\n- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)\n- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)\n- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)\n- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)\n- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)\n- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)\n- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)\n- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)\n- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)\n- RDMA/qedr: Fix doorbell setting (bsc#1152489)\n- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)\n- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)\n- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)\n- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)\n- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)\n- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)\n- RDMA/qedr: SRQ's bug fixes (bsc#1152489)\n- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)\n- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)\n- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)\n- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)\n- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)\n- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489)\n- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)\n- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)\n- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)\n- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)\n- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)\n- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)\n- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)\n- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).\n- regulator: mcp16502: add linear_min_sel (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).\n- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).\n- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).\n- rsi: fix error return code in rsi_reset_card() (git-fixes).\n- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: delay draining the TX buffers (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).\n- s390: add 3f program exception handler (git-fixes).\n- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).\n- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).\n- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)\n- sched/fair: Fix race between runtime distribution and (git-fixes)\n- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)\n- sched/fair: Refill bandwidth before scaling (git-fixes)\n- sched: correct SD_flags returned by tl->sd_flags() (git-fixes)\n- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).\n- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).\n- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).\n- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).\n- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).\n- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).\n- scsi: fnic: Validate io_req before others (bsc#1175079).\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Get device objects using sas_address & portID (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733).\n- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).\n- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).\n- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).\n- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).\n- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).\n- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).\n- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).\n- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: geni: More properly switch to DMA mode (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- speakup: fix uninitialized flush_lock (git-fixes).\n- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).\n- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: fix resource leak for drivers without .remove callback (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: mt7621: Disable clock in probe error path (git-fixes).\n- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).\n- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).\n- spi: synquacer: Disable clock in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).\n- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).\n- tty: Fix ->session locking (bsc#1179745).\n- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).\n- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).\n- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).\n- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).\n- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).\n- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).\n- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).\n- udf: Fix memory leak when mounting (bsc#1179712).\n- usb/max3421: fix return error code in max3421_probe() (git-fixes).\n- usb: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- usb: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).\n- usb: serial: ch341: add new Product ID for CH341A (git-fixes).\n- usb: serial: ch341: sort device-id entries (git-fixes).\n- usb: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- usb: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- usb: serial: keyspan_pda: fix stalled writes (git-fixes).\n- usb: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- usb: serial: keyspan_pda: fix write deadlock (git-fixes).\n- usb: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- usb: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- usb: serial: kl5kusb105: fix memleak on open (git-fixes).\n- usb: serial: mos7720: fix parallel-port state restore (git-fixes).\n- usb: serial: option: add Fibocom NL668 variants (git-fixes).\n- usb: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- usb: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- usb: serial: option: fix Quectel BG96 matching (git-fixes).\n- usb: UAS: introduce a quirk to set no_write_same (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)\n- video: fbdev: sis: fix null ptr dereference (bsc#1152472)\n- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: Fix potential dereferencing of null pointer (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).\n- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).\n- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).\n- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).\n- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).\n- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).\n- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).\n- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).\n- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).\n- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).\n- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).\n- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2021-96,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-96", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0096-1.json", }, { category: "self", summary: "URL for SUSE-SU-2021:0096-1", url: "https://www.suse.com/support/update/announcement/2021/suse-su-20210096-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2021:0096-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-January/008187.html", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1149032", url: "https://bugzilla.suse.com/1149032", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1156315", url: "https://bugzilla.suse.com/1156315", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1158775", url: "https://bugzilla.suse.com/1158775", }, { category: "self", summary: "SUSE Bug 1161099", url: "https://bugzilla.suse.com/1161099", }, { category: "self", summary: "SUSE Bug 1165933", url: "https://bugzilla.suse.com/1165933", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1171000", url: "https://bugzilla.suse.com/1171000", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1171688", url: "https://bugzilla.suse.com/1171688", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172733", url: "https://bugzilla.suse.com/1172733", }, { category: "self", summary: "SUSE Bug 1174486", url: "https://bugzilla.suse.com/1174486", }, { category: "self", summary: "SUSE Bug 1175079", url: "https://bugzilla.suse.com/1175079", }, { category: "self", summary: "SUSE Bug 1175480", url: "https://bugzilla.suse.com/1175480", }, { category: "self", summary: "SUSE Bug 1175995", url: "https://bugzilla.suse.com/1175995", }, { category: "self", summary: "SUSE Bug 1176396", url: "https://bugzilla.suse.com/1176396", }, { category: "self", summary: "SUSE Bug 1176942", url: "https://bugzilla.suse.com/1176942", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177500", url: "https://bugzilla.suse.com/1177500", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1177679", url: "https://bugzilla.suse.com/1177679", }, { category: "self", summary: "SUSE Bug 1177733", url: "https://bugzilla.suse.com/1177733", }, { category: "self", summary: "SUSE Bug 1178049", url: "https://bugzilla.suse.com/1178049", }, { category: "self", summary: "SUSE Bug 1178203", url: "https://bugzilla.suse.com/1178203", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178612", url: "https://bugzilla.suse.com/1178612", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178660", url: "https://bugzilla.suse.com/1178660", }, { category: "self", summary: "SUSE Bug 1178756", url: "https://bugzilla.suse.com/1178756", }, { category: "self", summary: "SUSE Bug 1178780", url: "https://bugzilla.suse.com/1178780", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179434", url: "https://bugzilla.suse.com/1179434", }, { category: "self", summary: "SUSE Bug 1179435", url: "https://bugzilla.suse.com/1179435", }, { category: "self", summary: "SUSE Bug 1179519", url: "https://bugzilla.suse.com/1179519", }, { category: "self", summary: "SUSE Bug 1179575", url: "https://bugzilla.suse.com/1179575", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179604", url: "https://bugzilla.suse.com/1179604", }, { category: "self", summary: "SUSE Bug 1179639", url: "https://bugzilla.suse.com/1179639", }, { category: "self", summary: "SUSE Bug 1179652", url: "https://bugzilla.suse.com/1179652", }, { category: "self", summary: "SUSE Bug 1179656", url: "https://bugzilla.suse.com/1179656", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179675", url: "https://bugzilla.suse.com/1179675", }, { category: "self", summary: "SUSE Bug 1179676", url: "https://bugzilla.suse.com/1179676", }, { category: "self", summary: "SUSE Bug 1179677", url: "https://bugzilla.suse.com/1179677", }, { category: "self", summary: "SUSE Bug 1179678", url: "https://bugzilla.suse.com/1179678", }, { category: "self", summary: "SUSE Bug 1179679", url: "https://bugzilla.suse.com/1179679", }, { category: "self", summary: "SUSE Bug 1179680", url: "https://bugzilla.suse.com/1179680", }, { category: "self", summary: "SUSE Bug 1179681", url: "https://bugzilla.suse.com/1179681", }, { category: "self", summary: "SUSE Bug 1179682", url: "https://bugzilla.suse.com/1179682", }, { category: "self", summary: "SUSE Bug 1179683", url: "https://bugzilla.suse.com/1179683", }, { category: "self", summary: "SUSE Bug 1179684", url: "https://bugzilla.suse.com/1179684", }, { category: "self", summary: "SUSE Bug 1179685", url: "https://bugzilla.suse.com/1179685", }, { category: "self", summary: "SUSE Bug 1179687", url: "https://bugzilla.suse.com/1179687", }, { category: "self", summary: "SUSE Bug 1179688", url: "https://bugzilla.suse.com/1179688", }, { category: "self", summary: "SUSE Bug 1179689", url: "https://bugzilla.suse.com/1179689", }, { category: "self", summary: "SUSE Bug 1179690", url: "https://bugzilla.suse.com/1179690", }, { category: "self", summary: "SUSE Bug 1179703", url: "https://bugzilla.suse.com/1179703", }, { category: "self", summary: "SUSE Bug 1179704", url: "https://bugzilla.suse.com/1179704", }, { category: "self", summary: "SUSE Bug 1179707", url: "https://bugzilla.suse.com/1179707", }, { category: "self", summary: "SUSE Bug 1179709", url: "https://bugzilla.suse.com/1179709", }, { category: "self", summary: "SUSE Bug 1179710", url: "https://bugzilla.suse.com/1179710", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179712", url: "https://bugzilla.suse.com/1179712", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179763", url: "https://bugzilla.suse.com/1179763", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179892", url: "https://bugzilla.suse.com/1179892", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180056", url: "https://bugzilla.suse.com/1180056", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180261", url: "https://bugzilla.suse.com/1180261", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-27830 page", url: "https://www.suse.com/security/cve/CVE-2020-27830/", }, { category: "self", summary: "SUSE CVE CVE-2020-29370 page", url: "https://www.suse.com/security/cve/CVE-2020-29370/", }, { category: "self", summary: "SUSE CVE CVE-2020-29373 page", url: "https://www.suse.com/security/cve/CVE-2020-29373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-12T18:15:46Z", generator: { date: "2021-01-12T18:15:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2021:0096-1", initial_release_date: "2021-01-12T18:15:46Z", revision_history: [ { date: "2021-01-12T18:15:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-azure-5.3.18-18.32.1.noarch", product: { name: "kernel-devel-azure-5.3.18-18.32.1.noarch", product_id: "kernel-devel-azure-5.3.18-18.32.1.noarch", }, }, { category: "product_version", name: "kernel-source-azure-5.3.18-18.32.1.noarch", product: { name: "kernel-source-azure-5.3.18-18.32.1.noarch", product_id: "kernel-source-azure-5.3.18-18.32.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-azure-5.3.18-18.32.1.x86_64", product: { name: "cluster-md-kmp-azure-5.3.18-18.32.1.x86_64", product_id: "cluster-md-kmp-azure-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-azure-5.3.18-18.32.1.x86_64", product: { name: "dlm-kmp-azure-5.3.18-18.32.1.x86_64", product_id: "dlm-kmp-azure-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-azure-5.3.18-18.32.1.x86_64", product: { name: "gfs2-kmp-azure-5.3.18-18.32.1.x86_64", product_id: "gfs2-kmp-azure-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-5.3.18-18.32.1.x86_64", product: { name: "kernel-azure-5.3.18-18.32.1.x86_64", product_id: "kernel-azure-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-devel-5.3.18-18.32.1.x86_64", product: { name: "kernel-azure-devel-5.3.18-18.32.1.x86_64", product_id: "kernel-azure-devel-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-extra-5.3.18-18.32.1.x86_64", product: { name: "kernel-azure-extra-5.3.18-18.32.1.x86_64", product_id: "kernel-azure-extra-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "kernel-azure-livepatch-devel-5.3.18-18.32.1.x86_64", product: { name: "kernel-azure-livepatch-devel-5.3.18-18.32.1.x86_64", product_id: "kernel-azure-livepatch-devel-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-azure-5.3.18-18.32.1.x86_64", product: { name: "kernel-syms-azure-5.3.18-18.32.1.x86_64", product_id: "kernel-syms-azure-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-azure-5.3.18-18.32.1.x86_64", product: { name: "kselftests-kmp-azure-5.3.18-18.32.1.x86_64", product_id: "kselftests-kmp-azure-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-azure-5.3.18-18.32.1.x86_64", product: { name: "ocfs2-kmp-azure-5.3.18-18.32.1.x86_64", product_id: "ocfs2-kmp-azure-5.3.18-18.32.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-azure-5.3.18-18.32.1.x86_64", product: { name: "reiserfs-kmp-azure-5.3.18-18.32.1.x86_64", product_id: "reiserfs-kmp-azure-5.3.18-18.32.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", product: { name: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-public-cloud:15:sp2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-azure-5.3.18-18.32.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", }, product_reference: "kernel-azure-5.3.18-18.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-azure-devel-5.3.18-18.32.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", }, product_reference: "kernel-azure-devel-5.3.18-18.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-azure-5.3.18-18.32.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", }, product_reference: "kernel-devel-azure-5.3.18-18.32.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-azure-5.3.18-18.32.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", }, product_reference: "kernel-source-azure-5.3.18-18.32.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-azure-5.3.18-18.32.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2", product_id: "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", }, product_reference: "kernel-syms-azure-5.3.18-18.32.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Module for Public Cloud 15 SP2", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-27830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27830", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27830", url: "https://www.suse.com/security/cve/CVE-2020-27830", }, { category: "external", summary: "SUSE Bug 1179656 for CVE-2020-27830", url: "https://bugzilla.suse.com/1179656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "moderate", }, ], title: "CVE-2020-27830", }, { cve: "CVE-2020-29370", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29370", }, ], notes: [ { category: "general", text: "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29370", url: "https://www.suse.com/security/cve/CVE-2020-29370", }, { category: "external", summary: "SUSE Bug 1179435 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179435", }, { category: "external", summary: "SUSE Bug 1179648 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179648", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "moderate", }, ], title: "CVE-2020-29370", }, { cve: "CVE-2020-29373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29373", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29373", url: "https://www.suse.com/security/cve/CVE-2020-29373", }, { category: "external", summary: "SUSE Bug 1179434 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179434", }, { category: "external", summary: "SUSE Bug 1179779 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "important", }, ], title: "CVE-2020-29373", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.32.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.32.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.32.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-12T18:15:46Z", details: "important", }, ], title: "CVE-2020-29661", }, ], }
WID-SEC-W-2022-2387
Vulnerability from csaf_certbund
Published
2020-12-15 23:00
Modified
2023-05-30 22:00
Summary
Google Android Patchday Dezember 2020
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erhöhen, einen Denial of Service Zustand herbeizuführen oder Informationen offenzulegen.
Betroffene Betriebssysteme
- Android
- Blackberry
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erhöhen, einen Denial of Service Zustand herbeizuführen oder Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- Android\n- Blackberry", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-2387 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-2387.json", }, { category: "self", summary: "WID-SEC-2022-2387 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2387", }, { category: "external", summary: "IBM Security Bulletin 6999317 vom 2023-05-30", url: "https://www.ibm.com/support/pages/node/6999317", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2314-1 vom 2023-05-30", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/015022.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2021-026 vom 2021-05-07", url: "https://downloads.avaya.com/css/P8/documents/101075693", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1093 vom 2021-04-06", url: "https://access.redhat.com/errata/RHSA-2021:1093", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1093 vom 2021-04-07", url: "http://linux.oracle.com/errata/ELSA-2021-1093.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-9164 vom 2021-04-09", url: "http://linux.oracle.com/errata/ELSA-2021-9164.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:2099 vom 2021-05-25", url: "https://access.redhat.com/errata/RHSA-2021:2099", }, { category: "external", summary: "Android Security Bulletin Dezember 2020 vom 2020-12-15", url: "https://source.android.com/security/bulletin/2020-12-01", }, { category: "external", summary: "Pixel Update Bulletin - Dezember 2020", url: "https://source.android.com/security/bulletin/pixel/2020-12-01", }, { category: "external", summary: "BlackBerry Powered by Android Security Bulletin - December 2020", url: "http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000072551", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3933-1 vom 2020-12-24", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:2106 vom 2021-05-25", url: "https://access.redhat.com/errata/RHSA-2021:2106", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:0452-1 vom 2021-02-12", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0686 vom 2021-03-02", url: "https://access.redhat.com/errata/RHSA-2021:0686", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0689 vom 2021-03-02", url: "https://access.redhat.com/errata/RHSA-2021:0689", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0763 vom 2021-03-09", url: "https://access.redhat.com/errata/RHSA-2021:0763", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0774 vom 2021-03-09", url: "https://access.redhat.com/errata/RHSA-2021:0774", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0765 vom 2021-03-09", url: "https://access.redhat.com/errata/RHSA-2021:0765", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0529 vom 2022-02-15", url: "https://access.redhat.com/errata/RHSA-2022:0529", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0533 vom 2022-02-15", url: "https://access.redhat.com/errata/RHSA-2022:0533", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0531 vom 2022-02-15", url: "https://access.redhat.com/errata/RHSA-2022:0531", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0592 vom 2022-02-22", url: "https://access.redhat.com/errata/RHSA-2022:0592", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0622 vom 2022-02-22", url: "https://access.redhat.com/errata/RHSA-2022:0622", }, { category: "external", summary: "AVAYA Security Advisory ASA-2022-026 vom 2022-02-25", url: "https://downloads.avaya.com/css/P8/documents/101080640", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0712 vom 2022-03-01", url: "https://access.redhat.com/errata/RHSA-2022:0712", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0718 vom 2022-03-01", url: "https://access.redhat.com/errata/RHSA-2022:0718", }, ], source_lang: "en-US", title: "Google Android Patchday Dezember 2020", tracking: { current_release_date: "2023-05-30T22:00:00.000+00:00", generator: { date: "2024-08-15T17:40:23.360+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-2387", initial_release_date: "2020-12-15T23:00:00.000+00:00", revision_history: [ { date: "2020-12-15T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2020-12-22T23:00:00.000+00:00", number: "2", summary: "Neue Updates von BlackBerry aufgenommen", }, { date: "2020-12-27T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-02-14T23:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-03-01T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-03-08T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-04-06T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-04-07T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2021-04-08T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2021-05-09T22:00:00.000+00:00", number: "10", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2021-05-24T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-05-25T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-02-15T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-02-22T23:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-02-27T23:00:00.000+00:00", number: "15", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2022-03-01T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-12-21T23:00:00.000+00:00", number: "17", summary: "CVE ergänzt", }, { date: "2023-05-30T22:00:00.000+00:00", number: "18", summary: "Neue Updates von SUSE und IBM aufgenommen", }, ], status: "final", version: "18", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { branches: [ { category: "product_name", name: "Google Android 8.0", product: { name: "Google Android 8.0", product_id: "344177", product_identification_helper: { cpe: "cpe:/o:google:android:8.0", }, }, }, { category: "product_name", name: "Google Android 8.1", product: { name: "Google Android 8.1", product_id: "407131", product_identification_helper: { cpe: "cpe:/o:google:android:8.1", }, }, }, { category: "product_name", name: "Google Android 10", product: { name: "Google Android 10", product_id: "560061", product_identification_helper: { cpe: "cpe:/o:google:android:10.0", }, }, }, { category: "product_name", name: "Google Android 9", product: { name: "Google Android 9", product_id: "T012696", product_identification_helper: { cpe: "cpe:/o:google:android:9", }, }, }, { category: "product_name", name: "Google Android 11", product: { name: "Google Android 11", product_id: "T017166", product_identification_helper: { cpe: "cpe:/o:google:android:11", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Google", }, { branches: [ { branches: [ { category: "product_name", name: "IBM Security Guardium 11.4", product: { name: "IBM Security Guardium 11.4", product_id: "1076561", product_identification_helper: { cpe: "cpe:/a:ibm:security_guardium:11.4", }, }, }, { category: "product_name", name: "IBM Security Guardium 11.5", product: { name: "IBM Security Guardium 11.5", product_id: "T026399", product_identification_helper: { cpe: "cpe:/a:ibm:security_guardium:11.5", }, }, }, ], category: "product_name", name: "Security Guardium", }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "BlackBerry BlackBerry", product: { name: "BlackBerry BlackBerry", product_id: "1321", product_identification_helper: { cpe: "cpe:/h:rim:blackberry:-", }, }, }, ], category: "vendor", name: "RIM", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16862", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2018-16862", }, { cve: "CVE-2019-19535", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2019-19535", }, { cve: "CVE-2019-20812", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2019-20812", }, { cve: "CVE-2020-0016", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0016", }, { cve: "CVE-2020-0019", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0019", }, { cve: "CVE-2020-0099", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0099", }, { cve: "CVE-2020-0202", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0202", }, { cve: "CVE-2020-0244", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0244", }, { cve: "CVE-2020-0280", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0280", }, { cve: "CVE-2020-0294", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0294", }, { cve: "CVE-2020-0368", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0368", }, { cve: "CVE-2020-0440", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0440", }, { cve: "CVE-2020-0444", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0444", }, { cve: "CVE-2020-0455", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0455", }, { cve: "CVE-2020-0456", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0456", }, { cve: "CVE-2020-0457", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0457", }, { cve: "CVE-2020-0458", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0458", }, { cve: "CVE-2020-0459", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0459", }, { cve: "CVE-2020-0460", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0460", }, { cve: "CVE-2020-0463", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0463", }, { cve: "CVE-2020-0464", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0464", }, { cve: "CVE-2020-0465", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0466", }, { cve: "CVE-2020-0467", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0467", }, { cve: "CVE-2020-0468", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0468", }, { cve: "CVE-2020-0469", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0469", }, { cve: "CVE-2020-0470", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0470", }, { cve: "CVE-2020-0473", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0473", }, { cve: "CVE-2020-0474", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0474", }, { cve: "CVE-2020-0475", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0475", }, { cve: "CVE-2020-0476", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0476", }, { cve: "CVE-2020-0477", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0477", }, { cve: "CVE-2020-0478", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0478", }, { cve: "CVE-2020-0479", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0479", }, { cve: "CVE-2020-0480", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0480", }, { cve: "CVE-2020-0481", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0481", }, { cve: "CVE-2020-0482", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0482", }, { cve: "CVE-2020-0483", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0483", }, { cve: "CVE-2020-0484", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0484", }, { cve: "CVE-2020-0485", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0485", }, { cve: "CVE-2020-0486", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0486", }, { cve: "CVE-2020-0487", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0487", }, { cve: "CVE-2020-0488", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0488", }, { cve: "CVE-2020-0489", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0489", }, { cve: "CVE-2020-0490", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0490", }, { cve: "CVE-2020-0491", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0491", }, { cve: "CVE-2020-0492", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0492", }, { cve: "CVE-2020-0493", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0493", }, { cve: "CVE-2020-0494", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0494", }, { cve: "CVE-2020-0495", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0495", }, { cve: "CVE-2020-0496", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0496", }, { cve: "CVE-2020-0497", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0497", }, { cve: "CVE-2020-0498", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0498", }, { cve: "CVE-2020-0499", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0499", }, { cve: "CVE-2020-0500", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0500", }, { cve: "CVE-2020-11119", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11119", }, { cve: "CVE-2020-11136", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11136", }, { cve: "CVE-2020-11137", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11137", }, { cve: "CVE-2020-11138", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11138", }, { cve: "CVE-2020-11139", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11139", }, { cve: "CVE-2020-11140", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11140", }, { cve: "CVE-2020-11143", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11143", }, { cve: "CVE-2020-11144", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11144", }, { cve: "CVE-2020-11145", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11145", }, { cve: "CVE-2020-11146", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11146", }, { cve: "CVE-2020-11148", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11148", }, { cve: "CVE-2020-11149", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11149", }, { cve: "CVE-2020-11150", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11150", }, { cve: "CVE-2020-11151", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11151", }, { cve: "CVE-2020-11152", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11152", }, { cve: "CVE-2020-11167", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11167", }, { cve: "CVE-2020-11179", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11179", }, { cve: "CVE-2020-11183", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11183", }, { cve: "CVE-2020-11185", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11185", }, { cve: "CVE-2020-11197", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11197", }, { cve: "CVE-2020-11200", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11200", }, { cve: "CVE-2020-11212", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11212", }, { cve: "CVE-2020-11213", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11213", }, { cve: "CVE-2020-11214", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11214", }, { cve: "CVE-2020-11215", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11215", }, { cve: "CVE-2020-11216", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11216", }, { cve: "CVE-2020-11217", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11217", }, { cve: "CVE-2020-11225", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11225", }, { cve: "CVE-2020-13143", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-13143", }, { cve: "CVE-2020-15802", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-15802", }, { cve: "CVE-2020-25220", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-25220", }, { cve: "CVE-2020-27021", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27021", }, { cve: "CVE-2020-27023", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27023", }, { cve: "CVE-2020-27024", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27024", }, { cve: "CVE-2020-27025", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27025", }, { cve: "CVE-2020-27026", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27026", }, { cve: "CVE-2020-27027", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27027", }, { cve: "CVE-2020-27028", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27028", }, { cve: "CVE-2020-27029", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27029", }, { cve: "CVE-2020-27030", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27030", }, { cve: "CVE-2020-27031", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27031", }, { cve: "CVE-2020-27032", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27032", }, { cve: "CVE-2020-27033", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27033", }, { cve: "CVE-2020-27034", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27034", }, { cve: "CVE-2020-27035", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27035", }, { cve: "CVE-2020-27036", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27036", }, { cve: "CVE-2020-27037", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27037", }, { cve: "CVE-2020-27038", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27038", }, { cve: "CVE-2020-27039", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27039", }, { cve: "CVE-2020-27040", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27040", }, { cve: "CVE-2020-27041", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27041", }, { cve: "CVE-2020-27043", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27043", }, { cve: "CVE-2020-27044", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27044", }, { cve: "CVE-2020-27045", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27045", }, { cve: "CVE-2020-27046", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27046", }, { cve: "CVE-2020-27047", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27047", }, { cve: "CVE-2020-27048", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27048", }, { cve: "CVE-2020-27049", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27049", }, { cve: "CVE-2020-27050", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27050", }, { cve: "CVE-2020-27051", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27051", }, { cve: "CVE-2020-27052", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27052", }, { cve: "CVE-2020-27053", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27053", }, { cve: "CVE-2020-27054", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27054", }, { cve: "CVE-2020-27055", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27055", }, { cve: "CVE-2020-27056", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27056", }, { cve: "CVE-2020-27057", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27057", }, { cve: "CVE-2020-27066", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27066", }, { cve: "CVE-2020-27067", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27067", }, { cve: "CVE-2020-27068", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27068", }, { cve: "CVE-2020-3685", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-3685", }, { cve: "CVE-2020-3686", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-3686", }, { cve: "CVE-2020-3691", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-3691", }, { cve: "CVE-2022-42543", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2022-42543", }, { cve: "CVE-2022-42544", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2022-42544", }, ], }
wid-sec-w-2022-2387
Vulnerability from csaf_certbund
Published
2020-12-15 23:00
Modified
2023-05-30 22:00
Summary
Google Android Patchday Dezember 2020
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erhöhen, einen Denial of Service Zustand herbeizuführen oder Informationen offenzulegen.
Betroffene Betriebssysteme
- Android
- Blackberry
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Das Android Betriebssystem von Google ist eine quelloffene Plattform für mobile Geräte. Die Basis bildet der Linux-Kernel.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Google Android ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, seine Privilegien zu erhöhen, einen Denial of Service Zustand herbeizuführen oder Informationen offenzulegen.", title: "Angriff", }, { category: "general", text: "- Android\n- Blackberry", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2022-2387 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2020/wid-sec-w-2022-2387.json", }, { category: "self", summary: "WID-SEC-2022-2387 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2387", }, { category: "external", summary: "IBM Security Bulletin 6999317 vom 2023-05-30", url: "https://www.ibm.com/support/pages/node/6999317", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2023:2314-1 vom 2023-05-30", url: "https://lists.suse.com/pipermail/sle-security-updates/2023-May/015022.html", }, { category: "external", summary: "AVAYA Security Advisory ASA-2021-026 vom 2021-05-07", url: "https://downloads.avaya.com/css/P8/documents/101075693", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:1093 vom 2021-04-06", url: "https://access.redhat.com/errata/RHSA-2021:1093", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-1093 vom 2021-04-07", url: "http://linux.oracle.com/errata/ELSA-2021-1093.html", }, { category: "external", summary: "Oracle Linux Security Advisory ELSA-2021-9164 vom 2021-04-09", url: "http://linux.oracle.com/errata/ELSA-2021-9164.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:2099 vom 2021-05-25", url: "https://access.redhat.com/errata/RHSA-2021:2099", }, { category: "external", summary: "Android Security Bulletin Dezember 2020 vom 2020-12-15", url: "https://source.android.com/security/bulletin/2020-12-01", }, { category: "external", summary: "Pixel Update Bulletin - Dezember 2020", url: "https://source.android.com/security/bulletin/pixel/2020-12-01", }, { category: "external", summary: "BlackBerry Powered by Android Security Bulletin - December 2020", url: "http://support.blackberry.com/kb/articleDetail?language=en_US&articleNumber=000072551", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2020:3933-1 vom 2020-12-24", url: "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008120.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:2106 vom 2021-05-25", url: "https://access.redhat.com/errata/RHSA-2021:2106", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2021:0452-1 vom 2021-02-12", url: "https://lists.suse.com/pipermail/sle-security-updates/2021-February/008323.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0686 vom 2021-03-02", url: "https://access.redhat.com/errata/RHSA-2021:0686", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0689 vom 2021-03-02", url: "https://access.redhat.com/errata/RHSA-2021:0689", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0763 vom 2021-03-09", url: "https://access.redhat.com/errata/RHSA-2021:0763", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0774 vom 2021-03-09", url: "https://access.redhat.com/errata/RHSA-2021:0774", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2021:0765 vom 2021-03-09", url: "https://access.redhat.com/errata/RHSA-2021:0765", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0529 vom 2022-02-15", url: "https://access.redhat.com/errata/RHSA-2022:0529", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0533 vom 2022-02-15", url: "https://access.redhat.com/errata/RHSA-2022:0533", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0531 vom 2022-02-15", url: "https://access.redhat.com/errata/RHSA-2022:0531", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0592 vom 2022-02-22", url: "https://access.redhat.com/errata/RHSA-2022:0592", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0622 vom 2022-02-22", url: "https://access.redhat.com/errata/RHSA-2022:0622", }, { category: "external", summary: "AVAYA Security Advisory ASA-2022-026 vom 2022-02-25", url: "https://downloads.avaya.com/css/P8/documents/101080640", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0712 vom 2022-03-01", url: "https://access.redhat.com/errata/RHSA-2022:0712", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2022:0718 vom 2022-03-01", url: "https://access.redhat.com/errata/RHSA-2022:0718", }, ], source_lang: "en-US", title: "Google Android Patchday Dezember 2020", tracking: { current_release_date: "2023-05-30T22:00:00.000+00:00", generator: { date: "2024-08-15T17:40:23.360+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2022-2387", initial_release_date: "2020-12-15T23:00:00.000+00:00", revision_history: [ { date: "2020-12-15T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2020-12-22T23:00:00.000+00:00", number: "2", summary: "Neue Updates von BlackBerry aufgenommen", }, { date: "2020-12-27T23:00:00.000+00:00", number: "3", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-02-14T23:00:00.000+00:00", number: "4", summary: "Neue Updates von SUSE aufgenommen", }, { date: "2021-03-01T23:00:00.000+00:00", number: "5", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-03-08T23:00:00.000+00:00", number: "6", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-04-06T22:00:00.000+00:00", number: "7", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-04-07T22:00:00.000+00:00", number: "8", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2021-04-08T22:00:00.000+00:00", number: "9", summary: "Neue Updates von Oracle Linux aufgenommen", }, { date: "2021-05-09T22:00:00.000+00:00", number: "10", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2021-05-24T22:00:00.000+00:00", number: "11", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2021-05-25T22:00:00.000+00:00", number: "12", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-02-15T23:00:00.000+00:00", number: "13", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-02-22T23:00:00.000+00:00", number: "14", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-02-27T23:00:00.000+00:00", number: "15", summary: "Neue Updates von AVAYA aufgenommen", }, { date: "2022-03-01T23:00:00.000+00:00", number: "16", summary: "Neue Updates von Red Hat aufgenommen", }, { date: "2022-12-21T23:00:00.000+00:00", number: "17", summary: "CVE ergänzt", }, { date: "2023-05-30T22:00:00.000+00:00", number: "18", summary: "Neue Updates von SUSE und IBM aufgenommen", }, ], status: "final", version: "18", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Avaya Aura Application Enablement Services", product: { name: "Avaya Aura Application Enablement Services", product_id: "T015516", product_identification_helper: { cpe: "cpe:/a:avaya:aura_application_enablement_services:-", }, }, }, { category: "product_name", name: "Avaya Aura Communication Manager", product: { name: "Avaya Aura Communication Manager", product_id: "T015126", product_identification_helper: { cpe: "cpe:/a:avaya:communication_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura Experience Portal", product: { name: "Avaya Aura Experience Portal", product_id: "T015519", product_identification_helper: { cpe: "cpe:/a:avaya:aura_experience_portal:-", }, }, }, { category: "product_name", name: "Avaya Aura Session Manager", product: { name: "Avaya Aura Session Manager", product_id: "T015127", product_identification_helper: { cpe: "cpe:/a:avaya:session_manager:-", }, }, }, { category: "product_name", name: "Avaya Aura System Manager", product: { name: "Avaya Aura System Manager", product_id: "T015518", product_identification_helper: { cpe: "cpe:/a:avaya:aura_system_manager:-", }, }, }, { category: "product_name", name: "Avaya Web License Manager", product: { name: "Avaya Web License Manager", product_id: "T016243", product_identification_helper: { cpe: "cpe:/a:avaya:web_license_manager:-", }, }, }, ], category: "vendor", name: "Avaya", }, { branches: [ { branches: [ { category: "product_name", name: "Google Android 8.0", product: { name: "Google Android 8.0", product_id: "344177", product_identification_helper: { cpe: "cpe:/o:google:android:8.0", }, }, }, { category: "product_name", name: "Google Android 8.1", product: { name: "Google Android 8.1", product_id: "407131", product_identification_helper: { cpe: "cpe:/o:google:android:8.1", }, }, }, { category: "product_name", name: "Google Android 10", product: { name: "Google Android 10", product_id: "560061", product_identification_helper: { cpe: "cpe:/o:google:android:10.0", }, }, }, { category: "product_name", name: "Google Android 9", product: { name: "Google Android 9", product_id: "T012696", product_identification_helper: { cpe: "cpe:/o:google:android:9", }, }, }, { category: "product_name", name: "Google Android 11", product: { name: "Google Android 11", product_id: "T017166", product_identification_helper: { cpe: "cpe:/o:google:android:11", }, }, }, ], category: "product_name", name: "Android", }, ], category: "vendor", name: "Google", }, { branches: [ { branches: [ { category: "product_name", name: "IBM Security Guardium 11.4", product: { name: "IBM Security Guardium 11.4", product_id: "1076561", product_identification_helper: { cpe: "cpe:/a:ibm:security_guardium:11.4", }, }, }, { category: "product_name", name: "IBM Security Guardium 11.5", product: { name: "IBM Security Guardium 11.5", product_id: "T026399", product_identification_helper: { cpe: "cpe:/a:ibm:security_guardium:11.5", }, }, }, ], category: "product_name", name: "Security Guardium", }, ], category: "vendor", name: "IBM", }, { branches: [ { category: "product_name", name: "Oracle Linux", product: { name: "Oracle Linux", product_id: "T004914", product_identification_helper: { cpe: "cpe:/o:oracle:linux:-", }, }, }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "BlackBerry BlackBerry", product: { name: "BlackBerry BlackBerry", product_id: "1321", product_identification_helper: { cpe: "cpe:/h:rim:blackberry:-", }, }, }, ], category: "vendor", name: "RIM", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "SUSE Linux", product: { name: "SUSE Linux", product_id: "T002207", product_identification_helper: { cpe: "cpe:/o:suse:suse_linux:-", }, }, }, ], category: "vendor", name: "SUSE", }, ], }, vulnerabilities: [ { cve: "CVE-2018-16862", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2018-16862", }, { cve: "CVE-2019-19535", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2019-19535", }, { cve: "CVE-2019-20812", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2019-20812", }, { cve: "CVE-2020-0016", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0016", }, { cve: "CVE-2020-0019", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0019", }, { cve: "CVE-2020-0099", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0099", }, { cve: "CVE-2020-0202", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0202", }, { cve: "CVE-2020-0244", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0244", }, { cve: "CVE-2020-0280", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0280", }, { cve: "CVE-2020-0294", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0294", }, { cve: "CVE-2020-0368", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0368", }, { cve: "CVE-2020-0440", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0440", }, { cve: "CVE-2020-0444", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0444", }, { cve: "CVE-2020-0455", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0455", }, { cve: "CVE-2020-0456", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0456", }, { cve: "CVE-2020-0457", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0457", }, { cve: "CVE-2020-0458", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0458", }, { cve: "CVE-2020-0459", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0459", }, { cve: "CVE-2020-0460", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0460", }, { cve: "CVE-2020-0463", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0463", }, { cve: "CVE-2020-0464", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0464", }, { cve: "CVE-2020-0465", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0466", }, { cve: "CVE-2020-0467", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0467", }, { cve: "CVE-2020-0468", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0468", }, { cve: "CVE-2020-0469", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0469", }, { cve: "CVE-2020-0470", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0470", }, { cve: "CVE-2020-0473", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0473", }, { cve: "CVE-2020-0474", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0474", }, { cve: "CVE-2020-0475", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0475", }, { cve: "CVE-2020-0476", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0476", }, { cve: "CVE-2020-0477", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0477", }, { cve: "CVE-2020-0478", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0478", }, { cve: "CVE-2020-0479", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0479", }, { cve: "CVE-2020-0480", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0480", }, { cve: "CVE-2020-0481", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0481", }, { cve: "CVE-2020-0482", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0482", }, { cve: "CVE-2020-0483", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0483", }, { cve: "CVE-2020-0484", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0484", }, { cve: "CVE-2020-0485", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0485", }, { cve: "CVE-2020-0486", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0486", }, { cve: "CVE-2020-0487", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0487", }, { cve: "CVE-2020-0488", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0488", }, { cve: "CVE-2020-0489", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0489", }, { cve: "CVE-2020-0490", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0490", }, { cve: "CVE-2020-0491", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0491", }, { cve: "CVE-2020-0492", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0492", }, { cve: "CVE-2020-0493", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0493", }, { cve: "CVE-2020-0494", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0494", }, { cve: "CVE-2020-0495", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0495", }, { cve: "CVE-2020-0496", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0496", }, { cve: "CVE-2020-0497", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0497", }, { cve: "CVE-2020-0498", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0498", }, { cve: "CVE-2020-0499", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0499", }, { cve: "CVE-2020-0500", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-0500", }, { cve: "CVE-2020-11119", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11119", }, { cve: "CVE-2020-11136", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11136", }, { cve: "CVE-2020-11137", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11137", }, { cve: "CVE-2020-11138", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11138", }, { cve: "CVE-2020-11139", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11139", }, { cve: "CVE-2020-11140", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11140", }, { cve: "CVE-2020-11143", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11143", }, { cve: "CVE-2020-11144", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11144", }, { cve: "CVE-2020-11145", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11145", }, { cve: "CVE-2020-11146", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11146", }, { cve: "CVE-2020-11148", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11148", }, { cve: "CVE-2020-11149", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11149", }, { cve: "CVE-2020-11150", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11150", }, { cve: "CVE-2020-11151", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11151", }, { cve: "CVE-2020-11152", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11152", }, { cve: "CVE-2020-11167", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11167", }, { cve: "CVE-2020-11179", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11179", }, { cve: "CVE-2020-11183", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11183", }, { cve: "CVE-2020-11185", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11185", }, { cve: "CVE-2020-11197", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11197", }, { cve: "CVE-2020-11200", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11200", }, { cve: "CVE-2020-11212", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11212", }, { cve: "CVE-2020-11213", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11213", }, { cve: "CVE-2020-11214", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11214", }, { cve: "CVE-2020-11215", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11215", }, { cve: "CVE-2020-11216", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11216", }, { cve: "CVE-2020-11217", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11217", }, { cve: "CVE-2020-11225", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-11225", }, { cve: "CVE-2020-13143", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-13143", }, { cve: "CVE-2020-15802", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-15802", }, { cve: "CVE-2020-25220", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-25220", }, { cve: "CVE-2020-27021", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27021", }, { cve: "CVE-2020-27023", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27023", }, { cve: "CVE-2020-27024", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27024", }, { cve: "CVE-2020-27025", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27025", }, { cve: "CVE-2020-27026", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27026", }, { cve: "CVE-2020-27027", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27027", }, { cve: "CVE-2020-27028", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27028", }, { cve: "CVE-2020-27029", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27029", }, { cve: "CVE-2020-27030", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27030", }, { cve: "CVE-2020-27031", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27031", }, { cve: "CVE-2020-27032", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27032", }, { cve: "CVE-2020-27033", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27033", }, { cve: "CVE-2020-27034", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27034", }, { cve: "CVE-2020-27035", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27035", }, { cve: "CVE-2020-27036", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27036", }, { cve: "CVE-2020-27037", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27037", }, { cve: "CVE-2020-27038", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27038", }, { cve: "CVE-2020-27039", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27039", }, { cve: "CVE-2020-27040", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27040", }, { cve: "CVE-2020-27041", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27041", }, { cve: "CVE-2020-27043", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27043", }, { cve: "CVE-2020-27044", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27044", }, { cve: "CVE-2020-27045", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27045", }, { cve: "CVE-2020-27046", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27046", }, { cve: "CVE-2020-27047", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27047", }, { cve: "CVE-2020-27048", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27048", }, { cve: "CVE-2020-27049", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27049", }, { cve: "CVE-2020-27050", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27050", }, { cve: "CVE-2020-27051", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27051", }, { cve: "CVE-2020-27052", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27052", }, { cve: "CVE-2020-27053", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27053", }, { cve: "CVE-2020-27054", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27054", }, { cve: "CVE-2020-27055", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27055", }, { cve: "CVE-2020-27056", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27056", }, { cve: "CVE-2020-27057", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27057", }, { cve: "CVE-2020-27066", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27066", }, { cve: "CVE-2020-27067", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27067", }, { cve: "CVE-2020-27068", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-27068", }, { cve: "CVE-2020-3685", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-3685", }, { cve: "CVE-2020-3686", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-3686", }, { cve: "CVE-2020-3691", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2020-3691", }, { cve: "CVE-2022-42543", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2022-42543", }, { cve: "CVE-2022-42544", notes: [ { category: "description", text: "In Google Android existieren mehrere Schwachstellen. Sie befinden sich in den Komponenten \"Framework\", \"Google Play\", \"Media Framework\", \"MediaTek\", \"Qualcomm closed-source components\", \"Qualcomm components\", \"Kernel\" und \"System\". Ein Angreifer kann dieses nutzen und seine Privilegien erweitern, Code zur Ausführung bringen, vertrauliche Daten einsehen, sowie einen Denial of Service Zustand herbeiführen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzerinteraktion erforderlich.", }, ], product_status: { known_affected: [ "344177", "T015519", "T015518", "67646", "T015516", "T012696", "1076561", "T015127", "T015126", "T004914", "407131", "T016243", "T017166", "T002207", "1321", "560061", "T026399", ], }, release_date: "2020-12-15T23:00:00.000+00:00", title: "CVE-2022-42544", }, ], }
ghsa-g6g5-f7cf-vx9w
Vulnerability from github
Published
2022-05-24 17:36
Modified
2022-06-16 00:00
Severity ?
Details
In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-119770583
{ affected: [], aliases: [ "CVE-2020-27068", ], database_specific: { cwe_ids: [ "CWE-125", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2020-12-15T17:15:00Z", severity: "MODERATE", }, details: "In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-119770583", id: "GHSA-g6g5-f7cf-vx9w", modified: "2022-06-16T00:00:27Z", published: "2022-05-24T17:36:32Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2020-27068", }, { type: "WEB", url: "https://source.android.com/security/bulletin/pixel/2020-12-01", }, { type: "WEB", url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", type: "CVSS_V3", }, ], }
opensuse-su-2021:0060-1
Vulnerability from csaf_opensuse
Published
2021-01-14 21:44
Modified
2021-01-14 21:44
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-27835: A use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).
- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).
- CVE-2020-28374: In drivers/target/target_core_xcopy.c insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore (bnc#1178372).
- CVE-2020-36158: mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c might have allowed remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332 (bnc#1180559).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2020-0466: In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180031).
- CVE-2020-27068: In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation (bnc#1180086).
- CVE-2020-0444: In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180027).
- CVE-2020-0465: In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180029).
- CVE-2020-29661: A locking issue was discovered in the tty subsystem of the Linux kernel drivers/tty/tty_jobctrl.c allowed a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b (bnc#1179745).
- CVE-2020-29660: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may have allowed a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24 (bnc#1179745).
- CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel (bnc#1179107).
- CVE-2020-29373: An issue was discovered in fs/io_uring.c in the Linux kernel It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d (bnc#1179434).
- CVE-2020-11668: drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandled invalid descriptors, aka CID-a246b4d54770 (bnc#1168952).
- CVE-2020-27830: Fixed a NULL-ptr deref bug in spk_ttyio_receive_buf2 (bnc#1179656).
- CVE-2020-29370: An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71 (bnc#1179435).
- CVE-2020-27786: A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation (bnc#1179601).
The following non-security bugs were fixed:
- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).
- ALSA: core: memalloc: add page alignment for iram (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).
- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).
- ALSA: hda/proc - print DP-MST connections (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).
- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).
- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).
- ALSA: hda/realtek - Modify Dell platform name (git-fixes).
- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).
- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).
- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).
- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).
- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).
- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).
- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).
- ALSA: seq: remove useless function (git-fixes).
- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).
- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).
- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).
- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).
- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).
- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).
- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).
- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).
- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).
- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).
- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).
- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).
- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).
- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).
- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).
- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).
- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).
- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).
- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).
- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).
- ALSA: usb-audio: Drop debug.h (bsc#1178203).
- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).
- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).
- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).
- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).
- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).
- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).
- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).
- ALSA: usb-audio: Improve some debug prints (bsc#1178203).
- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).
- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).
- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).
- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).
- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).
- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).
- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).
- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).
- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).
- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).
- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).
- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).
- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).
- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).
- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).
- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).
- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).
- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).
- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).
- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).
- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).
- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).
- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).
- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).
- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).
- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: meson: fix COMPILE_TEST error (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).
- ASoC: tegra20-spdif: remove 'default m' (git-fixes).
- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).
- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).
- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).
- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).
- Drop a backported uvcvideo patch that caused a regression (bsc#1180117) Also blacklisting the commit
- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).
- EDAC/amd64: Fix PCI component registration (bsc#1152489).
- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).
- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).
- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).
- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).
- HID: add support for Sega Saturn (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).
- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).
- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).
- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).
- HMAT: Register memory-side cache after parsing (bsc#1178660).
- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).
- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).
- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)
- IB/mlx4: Add and improve logging (bsc#1152489)
- IB/mlx4: Add support for MRA (bsc#1152489)
- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)
- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)
- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)
- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)
- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)
- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).
- Move 'btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).' to sorted section
- Move upstreamed USB-audio patches into sorted section
- PCI: Fix overflow in command-line resource alignment requests (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).
- PCI: iproc: Fix out-of-bound array accesses (git-fixes).
- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)
- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)
- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)
- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)
- RDMA/core: Fix reported speed and width (bsc#1152489)
- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)
- RDMA/core: Free DIM memory in error unwind (bsc#1152489)
- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)
- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)
- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)
- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)
- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)
- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)
- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)
- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)
- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)
- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)
- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)
- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)
- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)
- RDMA/qedr: Fix doorbell setting (bsc#1152489)
- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)
- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)
- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)
- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)
- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)
- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)
- RDMA/qedr: SRQ's bug fixes (bsc#1152489)
- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)
- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)
- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)
- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)
- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)
- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489)
- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)
- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)
- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)
- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)
- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)
- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)
- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)
- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)
- Revert 'ACPI / resources: Use AE_CTRL_TERMINATE to terminate resources walks' (git-fixes).
- Revert 'ceph: allow rename operation under different quota realms' (bsc#1180541).
- Revert 'geneve: pull IP header before ECN decapsulation' (git-fixes).
- Revert 'i2c: i2c-qcom-geni: Fix DMA transfer race' (git-fixes).
- Revert 'platform/x86: wmi: Destroy on cleanup rather than unregister' (git-fixes).
- Revert 'powerpc/pseries/hotplug-cpu: Remove double free in error path' (bsc#1065729).
- USB: UAS: introduce a quirk to set no_write_same (git-fixes).
- USB: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- USB: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- USB: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- USB: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- USB: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).
- USB: serial: ch341: add new Product ID for CH341A (git-fixes).
- USB: serial: ch341: sort device-id entries (git-fixes).
- USB: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- USB: serial: keyspan_pda: fix stalled writes (git-fixes).
- USB: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- USB: serial: keyspan_pda: fix write deadlock (git-fixes).
- USB: serial: keyspan_pda: fix write unthrottling (git-fixes).
- USB: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- USB: serial: kl5kusb105: fix memleak on open (git-fixes).
- USB: serial: kl5kusb105: fix memleak on open (git-fixes).
- USB: serial: mos7720: fix parallel-port state restore (git-fixes).
- USB: serial: option: add Fibocom NL668 variants (git-fixes).
- USB: serial: option: add interface-number sanity check to flag handling (git-fixes).
- USB: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- USB: serial: option: fix Quectel BG96 matching (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).
- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- batman-adv: Consider fragmentation for needed_headroom (git-fixes).
- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).
- batman-adv: Reserve needed_*room for fragments (git-fixes).
- bitmap: remove unused function declaration (git-fixes).
- blk-mq-blk-mq-provide-forced-completion-method.patch: (bsc#1175995,jsc#SLE-15608,bsc#1178756).
- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).
- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).
- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).
- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).
- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).
- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).
- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).
- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).
- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).
- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).
- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: c_can: c_can_power_up(): fix error handling (git-fixes).
- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: do not share tcons with DFS (bsc#1178270).
- cifs: document and cleanup dfs mount (bsc#1178270).
- cifs: ensure correct super block for DFS reconnect (bsc#1178270).
- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix double free error on share and prefix (bsc#1178270).
- cifs: fix leaked reference on requeued write (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).
- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).
- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).
- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).
- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).
- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).
- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).
- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).
- cifs: rename reconn_inval_dfs_target() (bsc#1178270).
- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).
- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).
- clk: ingenic: Fix divider calculation with div tables (git-fixes).
- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Do not return 0 on failure (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).
- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).
- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).
- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).
- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).
- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).
- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).
- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).
- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).
- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).
- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).
- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).
- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).
- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).
- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)
- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: * context fixes
- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)
- drm/gma500: fix error check (bsc#1152472) Backporting changes: * context fixes
- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: * context fixes
- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: * context fixes * adapted I/O functions to old driver
- drm/imx: tve remove extraneous type qualifier (bsc#1152489)
- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)
- drm/mediatek: Add missing put_device() call in (bsc#1152472)
- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: * context fixes * adapted to function layout
- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)
- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: * context fixes
- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)
- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: * context fixes
- drm/radeon: Prefer lower feedback dividers (bsc#1152489)
- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)
- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)
- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: * context fixes
- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: * context fixes
- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: * changed filename from vkms_composer.c to vkms_crc.c * context fixes
- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: * context fixes
- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: * context fixes
- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)
- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: * context fixes
- drm: rcar-du: Put reference to VSP device (bsc#1152489)
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethtool: fix error handling in ethtool_phys_id (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fail_function: Remove a redundant mutex unlock (bsc#1149032).
- fbcon: Remove the superfluous break (bsc#1152472)
- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- fs/minix: check return value of sb_getblk() (bsc#1179676).
- fs/minix: do not allow getting deleted inodes (bsc#1179677).
- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).
- fs/minix: reject too-large maximum file size (bsc#1179678).
- fs/minix: remove expected error message in block_to_path() (bsc#1179681).
- fs/minix: set s_maxbytes correctly (bsc#1179679).
- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).
- geneve: pull IP header before ECN decapsulation (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).
- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).
- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).
- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).
- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- iomap: Clear page error before beginning a write (bsc#1179683).
- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).
- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).
- iommu-amd-Increase-interrupt-remapping-table-limit-t.patch: (bsc#1179652).
- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: hook up missing RX handlers (git-fixes).
- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for USB audio driver (bsc#1178203).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kdb: Fix pager search for multi-line strings (git-fixes).
- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- kgdb: Drop malformed kernel doc comment (git-fixes).
- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).
- lib/string: remove unnecessary #undefs (git-fixes).
- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).
- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: imx214: Fix stop streaming (git-fixes).
- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).
- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).
- media: ipu3-cio2: Return actual subdev format (git-fixes).
- media: ipu3-cio2: Serialise access to pad format (git-fixes).
- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).
- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: tm6000: Fix sizeof() mismatches (git-fixes).
- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).
- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).
- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).
- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).
- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).
- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).
- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).
- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).
- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).
- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).
- mtd: spinand: Fix OOB read (git-fixes).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nvme-fabrics: allow to queue requests for live queues (git-fixes).
- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).
- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).
- nvme-fc: cancel async events before freeing event struct (git-fixes).
- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).
- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).
- nvme-fc: fix io timeout to abort I/O (bsc#1177326).
- nvme-fc: remove err_work work item (bsc#1177326).
- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).
- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).
- nvme-fc: track error_recovery while connecting (bsc#1177326).
- nvme-fc: wait for queues to freeze before calling (git-fixes).
- nvme-force-complete-cancelled-requests.patch: (bsc#1175995,bsc#1178756,jsc#SLE-15608). Without this we can end up with a series of nvme QID timeouts, regardless of filesystem when fstests is used or any error injection mechanism is used. Without this fix, we end up with 9 failures on xfs, but due to its generic nature, will likely end up with other failures on other filesystems. This does not allow a clean slate reliable fstests run. This fixes that issue. Through code inspection I found these changes were already present on SLE15-SP3 but not on SLE15-SP2.
- nvme-multipath: fix bogus request queue reference put (bsc#1175389).
- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).
- nvme-multipath: fix deadlock due to head->lock (git-fixes).
- nvme-pci: properly print controller address (git-fixes).
- nvme-rdma: avoid race between time out and tear down (bsc#1179519).
- nvme-rdma: avoid repeated request completion (bsc#1179519).
- nvme-rdma: cancel async events before freeing event struct (git-fixes).
- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).
- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-rdma: fix timeout handler (bsc#1179519).
- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).
- nvme-rdma: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: avoid race between time out and tear down (bsc#1179519).
- nvme-tcp: avoid repeated request completion (bsc#1179519).
- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).
- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).
- nvme-tcp: cancel async events before freeing event struct (git-fixes).
- nvme-tcp: do not poll a non-live queue (bsc#1179519).
- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).
- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).
- nvme-tcp: fix possible leakage during error flow (git-fixes).
- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).
- nvme-tcp: fix timeout handler (bsc#1179519).
- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).
- nvme-tcp: leverage request plugging (bsc#1179519).
- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).
- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).
- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).
- nvme-tcp: serialize controller teardown sequences (bsc#1179519).
- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).
- nvme-tcp: try to send request in queue_rq context (bsc#1179519).
- nvme-tcp: use bh_lock in data_ready (bsc#1179519).
- nvme: Revert: Fix controller creation races with teardown (git-fixes).
- nvme: do not protect ns mutation with ns->head->lock (git-fixes).
- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).
- nvme: introduce nvme_sync_io_queues (bsc#1179519).
- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).
- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).
- ocfs2: fix unbalanced locking (bsc#1180506).
- orinoco: Move context allocation after processing the skb (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).
- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).
- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).
- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).
- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).
- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).
- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- pwm: zx: Add missing cleanup in error path (git-fixes).
- qede: Notify qedr when mtu has changed (bsc#1152489)
- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- r8169: work around power-saving bug on some chip versions (git-fixes).
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).
- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).
- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).
- regulator: mcp16502: add linear_min_sel (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).
- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).
- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).
- rsi: fix error return code in rsi_reset_card() (git-fixes).
- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtc: pl031: fix resource leak in pl031_probe (git-fixes).
- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).
- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: delay draining the TX buffers (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).
- s390: add 3f program exception handler (git-fixes).
- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).
- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).
- sched/fair: Check for idle core in wake_affine (git fixes (sched)).
- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)
- sched/fair: Fix race between runtime distribution and (git-fixes)
- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)
- sched/fair: Refill bandwidth before scaling (git-fixes)
- sched: correct SD_flags returned by tl->sd_flags() (git-fixes)
- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).
- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).
- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).
- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).
- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).
- scsi: fnic: Validate io_req before others (bsc#1175079).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).
- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get device objects using sas_address & portID (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#1177733).
- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733). Replace patches.suse/qla2xxx-return-ebusy-on-fcport-deletion.patch with upstream version.
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).
- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733). Refresh: - patches.suse/qla2xxx-return-ebusy-on-fcport-deletion.patch
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).
- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).
- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).
- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).
- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).
- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).
- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).
- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: geni: More properly switch to DMA mode (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- speakup: fix uninitialized flush_lock (git-fixes).
- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).
- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: fix resource leak for drivers without .remove callback (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: mt7621: Disable clock in probe error path (git-fixes).
- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).
- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).
- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).
- spi: synquacer: Disable clock in probe error path (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).
- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).
- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).
- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
- tty: Fix ->session locking (bsc#1179745).
- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).
- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).
- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).
- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).
- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).
- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).
- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).
- udf: Fix memory leak when mounting (bsc#1179712).
- usb/max3421: fix return error code in max3421_probe() (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).
- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).
- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: usbip: vhci_hcd: protect shift size (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)
- video: fbdev: sis: fix null ptr dereference (bsc#1152472)
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- watchdog: Fix potential dereferencing of null pointer (git-fixes).
- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).
- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).
- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).
- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).
- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).
- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).
- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).
- x86/mm: Fix leak of pmd ptlock (bsc#1152489).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).
- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).
- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).
- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
Patchnames
openSUSE-2021-60
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-27835: A use after free in the Linux kernel infiniband hfi1 driver was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system (bnc#1179878).\n- CVE-2020-25639: Fixed a NULL pointer dereference via nouveau ioctl (bnc#1176846).\n- CVE-2020-28374: In drivers/target/target_core_xcopy.c insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore (bnc#1178372).\n- CVE-2020-36158: mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c might have allowed remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332 (bnc#1180559).\n- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).\n- CVE-2020-0466: In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180031).\n- CVE-2020-27068: In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation (bnc#1180086).\n- CVE-2020-0444: In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180027).\n- CVE-2020-0465: In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180029).\n- CVE-2020-29661: A locking issue was discovered in the tty subsystem of the Linux kernel drivers/tty/tty_jobctrl.c allowed a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b (bnc#1179745).\n- CVE-2020-29660: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may have allowed a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24 (bnc#1179745).\n- CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel (bnc#1179107).\n- CVE-2020-29373: An issue was discovered in fs/io_uring.c in the Linux kernel It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d (bnc#1179434).\n- CVE-2020-11668: drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandled invalid descriptors, aka CID-a246b4d54770 (bnc#1168952).\n- CVE-2020-27830: Fixed a NULL-ptr deref bug in spk_ttyio_receive_buf2 (bnc#1179656).\n- CVE-2020-29370: An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71 (bnc#1179435).\n- CVE-2020-27786: A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation (bnc#1179601).\n\nThe following non-security bugs were fixed:\n\n- ACPI: APEI: Kick the memory_failure() queue for synchronous errors (jsc#SLE-16610).\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ALSA/hda: apply jack fixup for the Acer Veriton N4640G/N6640G/N2510G (git-fixes).\n- ALSA: core: memalloc: add page alignment for iram (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/conexant: add a new hda codec CX11970 (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always print pin NIDs as hexadecimal (git-fixes).\n- ALSA: hda/hdmi: packet buffer index must be set before reading value (git-fixes).\n- ALSA: hda/proc - print DP-MST connections (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).\n- ALSA: hda/realtek - Add supported for more Lenovo ALC285 Headset Button (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS X430UN with ALC256 (git-fixes).\n- ALSA: hda/realtek - Fix speaker volume control on Lenovo C940 (git-fixes).\n- ALSA: hda/realtek - Fixed Dell AIO wrong sound tone (git-fixes).\n- ALSA: hda/realtek - Modify Dell platform name (git-fixes).\n- ALSA: hda/realtek - Supported Dell fixed type headset (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk for more HP laptops (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).\n- ALSA: hda/realtek: Add quirk for MSI-GP73 (git-fixes).\n- ALSA: hda/realtek: Add two 'Intel Reference board' SSID in the ALC256 (git-fixes).\n- ALSA: hda/realtek: Apply jack fixup for Quanta NL3 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).\n- ALSA: hda/realtek: Enable mute and micmute LED on HP EliteBook 850 G7 (git-fixes).\n- ALSA: hda/realtek: Fix bass speaker DAC assignment on Asus Zephyrus G14 (git-fixes).\n- ALSA: hda/realtek: Remove dummy lineout on Acer TravelMate P648/P658 (git-fixes).\n- ALSA: hda/realtek: make bass spk volume adjustable on a yoga laptop (git-fixes).\n- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: rawmidi: Access runtime->avail always in spinlock (git-fixes).\n- ALSA: seq: remove useless function (git-fixes).\n- ALSA: usb-audio: Add VID to support native DSD reproduction on FiiO devices (git-fixes).\n- ALSA: usb-audio: Add generic implicit fb parsing (bsc#1178203).\n- ALSA: usb-audio: Add hw constraint for implicit fb sync (bsc#1178203).\n- ALSA: usb-audio: Add implicit fb support for Steinberg UR22 (git-fixes).\n- ALSA: usb-audio: Add implicit_fb module option (bsc#1178203).\n- ALSA: usb-audio: Add quirk for BOSS AD-10 (git-fixes).\n- ALSA: usb-audio: Add quirk for Pioneer DJ DDJ-SR2 (git-fixes).\n- ALSA: usb-audio: Add quirk for RC-505 (git-fixes).\n- ALSA: usb-audio: Add snd_usb_get_endpoint() helper (bsc#1178203).\n- ALSA: usb-audio: Add snd_usb_get_host_interface() helper (bsc#1178203).\n- ALSA: usb-audio: Add support for Pioneer DJ DDJ-RR controller (git-fixes).\n- ALSA: usb-audio: Always set up the parameters after resume (bsc#1178203).\n- ALSA: usb-audio: Avoid doubly initialization for implicit fb (bsc#1178203).\n- ALSA: usb-audio: Check implicit feedback EP generically for UAC2 (bsc#1178203).\n- ALSA: usb-audio: Check valid altsetting at parsing rates for UAC2/3 (bsc#1178203).\n- ALSA: usb-audio: Constify audioformat pointer references (bsc#1178203).\n- ALSA: usb-audio: Convert to the common vmalloc memalloc (bsc#1178203).\n- ALSA: usb-audio: Correct wrongly matching entries with audio class (bsc#1178203).\n- ALSA: usb-audio: Create endpoint objects at parsing phase (bsc#1178203).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Do not call usb_set_interface() at trigger callback (bsc#1178203).\n- ALSA: usb-audio: Do not set altsetting before initializing sample rate (bsc#1178203).\n- ALSA: usb-audio: Drop debug.h (bsc#1178203).\n- ALSA: usb-audio: Drop keep_interface flag again (bsc#1178203).\n- ALSA: usb-audio: Drop unneeded snd_usb_substream fields (bsc#1178203).\n- ALSA: usb-audio: Factor out the implicit feedback quirk code (bsc#1178203).\n- ALSA: usb-audio: Fix EP matching for continuous rates (bsc#1178203).\n- ALSA: usb-audio: Fix MOTU M-Series quirks (bsc#1178203).\n- ALSA: usb-audio: Fix UBSAN warnings for MIDI jacks (git-fixes).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix possible stall of implicit fb packet ring-buffer (bsc#1178203).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix quirks for other BOSS devices (bsc#1178203).\n- ALSA: usb-audio: Handle discrete rates properly in hw constraints (bsc#1178203).\n- ALSA: usb-audio: Improve some debug prints (bsc#1178203).\n- ALSA: usb-audio: Move device rename and profile quirks to an internal table (bsc#1178203).\n- ALSA: usb-audio: Move snd_usb_autoresume() call out of setup_hw_info() (bsc#1178203).\n- ALSA: usb-audio: Pass snd_usb_audio object to quirk functions (bsc#1178203).\n- ALSA: usb-audio: Properly match with audio interface class (bsc#1178203).\n- ALSA: usb-audio: Quirk for BOSS GT-001 (bsc#1178203).\n- ALSA: usb-audio: Refactor endpoint management (bsc#1178203).\n- ALSA: usb-audio: Refactoring endpoint URB deactivation (bsc#1178203).\n- ALSA: usb-audio: Replace slave/master terms (bsc#1178203).\n- ALSA: usb-audio: Set and clear sync EP link properly (bsc#1178203).\n- ALSA: usb-audio: Set callbacks via snd_usb_endpoint_set_callback() (bsc#1178203).\n- ALSA: usb-audio: Show sync endpoint information in proc outputs (bsc#1178203).\n- ALSA: usb-audio: Simplify hw_params rules (bsc#1178203).\n- ALSA: usb-audio: Simplify quirk entries with a macro (bsc#1178203).\n- ALSA: usb-audio: Simplify rate_min/max and rates set up (bsc#1178203).\n- ALSA: usb-audio: Simplify snd_usb_init_pitch() arguments (bsc#1178203).\n- ALSA: usb-audio: Simplify snd_usb_init_sample_rate() arguments (bsc#1178203).\n- ALSA: usb-audio: Stop both endpoints properly at error (bsc#1178203).\n- ALSA: usb-audio: Support PCM sync_stop (bsc#1178203).\n- ALSA: usb-audio: Track implicit fb sync endpoint in audioformat list (bsc#1178203).\n- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).\n- ALSA: usb-audio: Unify the code for the next packet size calculation (bsc#1178203).\n- ALSA: usb-audio: Use ALC1220-VB-DT mapping for ASUS ROG Strix TRX40 mobo (bsc#1178203).\n- ALSA: usb-audio: Use atomic_t for endpoint use_count (bsc#1178203).\n- ALSA: usb-audio: Use managed buffer allocation (bsc#1178203).\n- ALSA: usb-audio: Use unsigned char for iface and altsettings fields (bsc#1178203).\n- ALSA: usb-audio: workaround for iface reset issue (bsc#1178203).\n- ASoC: Intel: bytcr_rt5640: Fix HP Pavilion x2 Detachable quirks (git-fixes).\n- ASoC: SOF: control: fix size checks for ext_bytes control .get() (git-fixes).\n- ASoC: amd: change clk_get() to devm_clk_get() and add missed checks (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: meson: fix COMPILE_TEST error (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: sun4i-i2s: Fix lrck_period computation for I2S justified mode (git-fixes).\n- ASoC: tegra20-spdif: remove 'default m' (git-fixes).\n- ASoC: ti: davinci-mcasp: remove always zero of davinci_mcasp_get_dt_params (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: fix error return code in wm_adsp_load() (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- Bluetooth: btmtksdio: Add the missed release_firmware() in mtk_setup_firmware() (git-fixes).\n- Bluetooth: btusb: Add the missed release_firmware() in btusb_mtk_setup_firmware() (git-fixes).\n- Bluetooth: hci_h5: close serdev device and free hu in h5_close (git-fixes).\n- Bluetooth: hci_h5: fix memory leak in h5_close (git-fixes).\n- Drop a backported uvcvideo patch that caused a regression (bsc#1180117) Also blacklisting the commit\n- EDAC/amd64: Do not load on family 0x15, model 0x13 (bsc#1179763).\n- EDAC/amd64: Fix PCI component registration (bsc#1152489).\n- EDAC/i10nm: Use readl() to access MMIO registers (bsc#1152489).\n- EDAC/mce_amd: Use struct cpuinfo_x86.cpu_die_id for AMD NodeId (bsc#1152489).\n- HID: Add Logitech Dinovo Edge battery quirk (git-fixes).\n- HID: add HID_QUIRK_INCREMENT_USAGE_ON_DUPLICATE for Gamevice devices (git-fixes).\n- HID: add support for Sega Saturn (git-fixes).\n- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: i2c-hid: add Vero K147 to descriptor override (git-fixes).\n- HID: ite: Replace ABS_MISC 120/121 events with touchpad on/off keypresses (git-fixes).\n- HID: logitech-hidpp: Add HIDPP_CONSUMER_VENDOR_KEYS quirk for the Dinovo Edge (git-fixes).\n- HID: uclogic: Add ID for Trust Flex Design Tablet (git-fixes).\n- HMAT: Register memory-side cache after parsing (bsc#1178660).\n- HMAT: Skip publishing target info for nodes with no online memory (bsc#1178660).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- IB/hfi1: Remove kobj from hfi1_devdata (bsc#1179878).\n- IB/hfi1: Remove module parameter for KDETH qpns (bsc#1179878).\n- IB/isert: Fix unaligned immediate-data handling (bsc#1152489)\n- IB/mlx4: Add and improve logging (bsc#1152489)\n- IB/mlx4: Add support for MRA (bsc#1152489)\n- IB/mlx4: Adjust delayed work when a dup is observed (bsc#1152489)\n- IB/mlx4: Fix starvation in paravirt mux/demux (bsc#1152489)\n- IB/mthca: fix return value of error branch in mthca_init_cq() (bsc#1152489)\n- IB/rdmavt: Fix sizeof mismatch (bsc#1152489)\n- IB/srpt: Fix memory leak in srpt_add_one (bsc#1152489)\n- IB/uverbs: Set IOVA on IB MR in uverbs layer (bsc#1152489)\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- KVM: PPC: Book3S HV: XIVE: Fix possible oops when accessing ESB page (bsc#1156395).\n- Move 'btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).' to sorted section\n- Move upstreamed USB-audio patches into sorted section\n- PCI: Fix overflow in command-line resource alignment requests (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- PCI: brcmstb: Initialize 'tmp' before use (git-fixes).\n- PCI: iproc: Fix out-of-bound array accesses (git-fixes).\n- RDMA/addr: Fix race with netevent_callback()/rdma_addr_cancel() (bsc#1152489)\n- RDMA/bnxt_re: Do not add user qps to flushlist (bsc#1152489)\n- RDMA/bnxt_re: Fix sizeof mismatch for allocation of pbl_tbl. (bsc#1152489)\n- RDMA/core: Fix bogus WARN_ON during ib_unregister_device_queued() (bsc#1152489)\n- RDMA/core: Fix reported speed and width (bsc#1152489)\n- RDMA/core: Fix return error value in _ib_modify_qp() to negative (bsc#1152489)\n- RDMA/core: Free DIM memory in error unwind (bsc#1152489)\n- RDMA/core: Stop DIM before destroying CQ (bsc#1152489)\n- RDMA/counter: Allow manually bind QPs with different pids to same counter (bsc#1152489)\n- RDMA/counter: Only bind user QPs in auto mode (bsc#1152489)\n- RDMA/hns: Add check for the validity of sl configuration (bsc#1152489)\n- RDMA/hns: Bugfix for memory window mtpt configuration (bsc#1152489)\n- RDMA/hns: Correct typo of hns_roce_create_cq() (bsc#1152489)\n- RDMA/hns: Fix missing sq_sig_type when querying QP (bsc#1152489)\n- RDMA/hns: Set the unsupported wr opcode (bsc#1152489)\n- RDMA/ipoib: Set rtnl_link_ops for ipoib interfaces (bsc#1152489)\n- RDMA/mlx5: Disable IB_DEVICE_MEM_MGT_EXTENSIONS if IB_WR_REG_MR can't work (bsc#1152489)\n- RDMA/netlink: Remove CAP_NET_RAW check when dump a raw QP (bsc#1152489)\n- RDMA/pvrdma: Fix missing kfree() in pvrdma_register_device() (bsc#1152489)\n- RDMA/qedr: Endianness warnings cleanup (bsc#1152489)\n- RDMA/qedr: Fix doorbell setting (bsc#1152489)\n- RDMA/qedr: Fix iWARP active mtu display (bsc#1152489)\n- RDMA/qedr: Fix inline size returned for iWARP (bsc#1152489)\n- RDMA/qedr: Fix memory leak in iWARP CM (bsc#1152489)\n- RDMA/qedr: Fix qp structure memory leak (bsc#1152489)\n- RDMA/qedr: Fix resource leak in qedr_create_qp (bsc#1152489)\n- RDMA/qedr: Fix use of uninitialized field (bsc#1152489)\n- RDMA/qedr: SRQ's bug fixes (bsc#1152489)\n- RDMA/rxe: Drop pointless checks in rxe_init_ports (bsc#1152489)\n- RDMA/rxe: Fix memleak in rxe_mem_init_user (bsc#1152489)\n- RDMA/rxe: Fix skb lifetime in rxe_rcv_mcast_pkt() (bsc#1152489)\n- RDMA/rxe: Fix the parent sysfs read when the interface has 15 chars (bsc#1152489)\n- RDMA/rxe: Handle skb_clone() failure in rxe_recv.c (bsc#1152489)\n- RDMA/rxe: Prevent access to wr->next ptr afrer wr is posted to send queue (bsc#1152489)\n- RDMA/rxe: Remove unused rxe_mem_map_pages (bsc#1152489)\n- RDMA/rxe: Return void from rxe_init_port_param() (bsc#1152489)\n- RDMA/rxe: Return void from rxe_mem_init_dma() (bsc#1152489)\n- RDMA/rxe: Skip dgid check in loopback mode (bsc#1152489)\n- RDMA/srpt: Fix typo in srpt_unregister_mad_agent docstring (bsc#1152489)\n- RDMA/umem: Fix ib_umem_find_best_pgsz() for mappings that cross a page boundary (bsc#1152489)\n- RDMA/umem: Prevent small pages from being returned by ib_umem_find_best_pgsz() (bsc#1152489)\n- Re-import the upstream uvcvideo fix; one more fix will be added later (bsc#1180117)\n- Revert 'ACPI / resources: Use AE_CTRL_TERMINATE to terminate resources walks' (git-fixes).\n- Revert 'ceph: allow rename operation under different quota realms' (bsc#1180541).\n- Revert 'geneve: pull IP header before ECN decapsulation' (git-fixes).\n- Revert 'i2c: i2c-qcom-geni: Fix DMA transfer race' (git-fixes).\n- Revert 'platform/x86: wmi: Destroy on cleanup rather than unregister' (git-fixes).\n- Revert 'powerpc/pseries/hotplug-cpu: Remove double free in error path' (bsc#1065729).\n- USB: UAS: introduce a quirk to set no_write_same (git-fixes).\n- USB: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- USB: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- USB: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- USB: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).\n- USB: quirks: Add USB_QUIRK_DISCONNECT_SUSPEND quirk for Lenovo A630Z TIO built-in usb-audio card (git-fixes).\n- USB: serial: ch341: add new Product ID for CH341A (git-fixes).\n- USB: serial: ch341: sort device-id entries (git-fixes).\n- USB: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).\n- USB: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- USB: serial: keyspan_pda: fix stalled writes (git-fixes).\n- USB: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- USB: serial: keyspan_pda: fix write deadlock (git-fixes).\n- USB: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- USB: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- USB: serial: kl5kusb105: fix memleak on open (git-fixes).\n- USB: serial: kl5kusb105: fix memleak on open (git-fixes).\n- USB: serial: mos7720: fix parallel-port state restore (git-fixes).\n- USB: serial: option: add Fibocom NL668 variants (git-fixes).\n- USB: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- USB: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- USB: serial: option: fix Quectel BG96 matching (git-fixes).\n- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).\n- USB: yurex: fix control-URB timeout handling (git-fixes).\n- arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (jsc#SLE-16610).\n- arm64: mm: Fix ARCH_LOW_ADDRESS_LIMIT when !CONFIG_ZONE_DMA (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- batman-adv: Consider fragmentation for needed_headroom (git-fixes).\n- batman-adv: Do not always reallocate the fragmentation skb head (git-fixes).\n- batman-adv: Reserve needed_*room for fragments (git-fixes).\n- bitmap: remove unused function declaration (git-fixes).\n- blk-mq-blk-mq-provide-forced-completion-method.patch: (bsc#1175995,jsc#SLE-15608,bsc#1178756).\n- blk-mq: Remove 'running from the wrong CPU' warning (bsc#1174486).\n- block: return status code in blk_mq_end_request() (bsc#1171000, bsc#1165933).\n- bpf: Fix bpf_put_raw_tracepoint()'s use of __module_address() (git-fixes).\n- btrfs: add missing check for nocow and compression inode flags (bsc#1178780).\n- btrfs: allow btrfs_truncate_block() to fallback to nocow for data space reservation (bsc#1161099).\n- btrfs: delete duplicated words + other fixes in comments (bsc#1180566).\n- btrfs: do not commit logs and transactions during link and rename operations (bsc#1180566).\n- btrfs: do not take the log_mutex of the subvolume when pinning the log (bsc#1180566).\n- btrfs: fix missing delalloc new bit for new delalloc ranges (bsc#1180773).\n- btrfs: fix readahead hang and use-after-free after removing a device (bsc#1179963).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: make btrfs_dirty_pages take btrfs_inode (bsc#1180773).\n- btrfs: make btrfs_set_extent_delalloc take btrfs_inode (bsc#1180773).\n- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).\n- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).\n- bus/fsl_mc: Do not rely on caller to provide non NULL mc_io (git-fixes).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: c_can: c_can_power_up(): fix error handling (git-fixes).\n- can: sja1000: sja1000_err(): do not count arbitration lose as an error (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- can: sun4i_can: sun4i_can_err(): do not count arbitration lose as an error (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cifs: Fix an error pointer dereference in cifs_mount() (bsc#1178270).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).\n- cifs: do not share tcons with DFS (bsc#1178270).\n- cifs: document and cleanup dfs mount (bsc#1178270).\n- cifs: ensure correct super block for DFS reconnect (bsc#1178270).\n- cifs: fix DFS mount with cifsacl/modefromsid (bsc#1178270).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix double free error on share and prefix (bsc#1178270).\n- cifs: fix leaked reference on requeued write (bsc#1178270).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cifs: fix uninitialised lease_key in open_shroot() (bsc#1178270).\n- cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1178270).\n- cifs: handle RESP_GET_DFS_REFERRAL.PathConsumed in reconnect (bsc#1178270).\n- cifs: handle empty list of targets in cifs_reconnect() (bsc#1178270).\n- cifs: handle hostnames that resolve to same ip in failover (bsc#1178270).\n- cifs: merge __{cifs,smb2}_reconnect[_tcon]() into cifs_tree_connect() (bsc#1178270).\n- cifs: only update prefix path of DFS links in cifs_tree_connect() (bsc#1178270).\n- cifs: reduce number of referral requests in DFS link lookups (bsc#1178270).\n- cifs: rename reconn_inval_dfs_target() (bsc#1178270).\n- cifs: set up next DFS target before generic_ip_connect() (bsc#1178270).\n- clk: at91: sam9x60: remove atmel,osc-bypass support (git-fixes).\n- clk: ingenic: Fix divider calculation with div tables (git-fixes).\n- clk: mediatek: Make mtk_clk_register_mux() a static function (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: renesas: r9a06g032: Drop __packed for portability (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Do not return 0 on failure (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clocksource/drivers/arm_arch_timer: Correct fault programming of CNTKCTL_EL1.EVNTI (git-fixes).\n- clocksource/drivers/arm_arch_timer: Use stable count reader in erratum sne (git-fixes).\n- clocksource/drivers/cadence_ttc: Fix memory leak in ttc_setup_clockevent() (git-fixes).\n- clocksource/drivers/orion: Add missing clk_disable_unprepare() on error path (git-fixes).\n- compiler_attributes.h: Add 'fallthrough' pseudo keyword for switch/case use (bsc#1178203).\n- coredump: fix core_pattern parse error (git-fixes).\n- cpufreq: ap806: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: mediatek: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: vexpress-spc: Add missing MODULE_ALIAS (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: atmel-i2c - select CONFIG_BITREVERSE (git-fixes).\n- crypto: crypto4xx - Replace bitwise OR with logical OR in crypto4xx_build_pd (git-fixes).\n- crypto: ecdh - avoid buffer overflow in ecdh_set_secret() (git-fixes).\n- crypto: ecdh - avoid unaligned accesses in ecdh_set_secret() (git-fixes).\n- crypto: inside-secure - Fix sizeof() mismatch (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: sun4i-ss - add the A33 variant of SS (git-fixes).\n- crypto: talitos - Endianess in current_desc_hdr() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- dmaengine: at_hdmac: Substitute kzalloc with kmalloc (git-fixes).\n- dmaengine: at_hdmac: add missing kfree() call in at_dma_xlate() (git-fixes).\n- dmaengine: at_hdmac: add missing put_device() call in at_dma_xlate() (git-fixes).\n- dmaengine: dw-edma: Fix use after free in dw_edma_alloc_chunk() (git-fixes).\n- dmaengine: mediatek: mtk-hsdma: Fix a resource leak in the error handling path of the probe function (git-fixes).\n- dmaengine: mv_xor_v2: Fix error return code in mv_xor_v2_probe() (git-fixes).\n- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).\n- dmaengine: xilinx_dma: fix incompatible param warning in _child_probe() (git-fixes).\n- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: Fix wrong return value in dm_update_plane_state() (bsc#1152489)\n- drm/amdgpu: pass NULL pointer instead of 0 (bsc#1152489) Backporting changes: \t* context fixes\n- drm/crc-debugfs: Fix memleak in crc_control_write (bsc#1152472)\n- drm/gma500: fix error check (bsc#1152472) Backporting changes: \t* context fixes\n- drm/i915/gem: Avoid implicit vmap for highmem on x86-32 (bsc#1152489) Backporting changes: \t* context fixes\n- drm/i915: Fix sha_text population code (bsc#1152489) Backporting changes: \t* context fixes \t* adapted I/O functions to old driver\n- drm/imx: tve remove extraneous type qualifier (bsc#1152489)\n- drm/mediatek: Add exception handing in mtk_drm_probe() if component (bsc#1152472)\n- drm/mediatek: Add missing put_device() call in (bsc#1152472)\n- drm/mediatek: Add missing put_device() call in mtk_drm_kms_init() (bsc#1152472) Backporting changes: \t* context fixes \t* adapted to function layout\n- drm/msm: Avoid div-by-zero in dpu_crtc_atomic_check() (bsc#1152489)\n- drm/msm: Drop debug print in _dpu_crtc_setup_lm_bounds() (bsc#1152489) Backporting changes: \t* context fixes\n- drm/panfrost: Ensure GPU quirks are always initialised (bsc#1152489)\n- drm/panfrost: increase readl_relaxed_poll_timeout values (bsc#1152472) Backporting changes: \t* context fixes\n- drm/radeon: Prefer lower feedback dividers (bsc#1152489)\n- drm/sun4i: sun8i-csc: Secondary CSC register correction (bsc#1152489)\n- drm/vc4/vc4_hdmi: fill ASoC card owner (bsc#1152489)\n- drm/vc4: crtc: Rework a bit the CRTC state code (bsc#1152472) Backporting changes: \t* context fixes\n- drm/vc4: hdmi: Avoid sleeping in atomic context (bsc#1152489) Backporting changes: \t* context fixes\n- drm/vkms: fix xrgb on compute crc (bsc#1152472) Backporting changes: \t* changed filename from vkms_composer.c to vkms_crc.c \t* context fixes\n- drm: mxsfb: Remove fbdev leftovers (bsc#1152472) Backporting changes: \t* context fixes\n- drm: mxsfb: check framebuffer pitch (bsc#1152472) Backporting changes: \t* context fixes\n- drm: panel: Fix bpc for OrtusTech COM43H4M85ULC panel (bsc#1152489)\n- drm: panel: Fix bus format for OrtusTech COM43H4M85ULC panel (bsc#1152472) Backporting changes: \t* context fixes\n- drm: rcar-du: Put reference to VSP device (bsc#1152489)\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ethtool: fix error handling in ethtool_phys_id (git-fixes).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fail_function: Remove a redundant mutex unlock (bsc#1149032).\n- fbcon: Remove the superfluous break (bsc#1152472)\n- firmware: arm_sdei: Document the motivation behind these set_fs() calls (jsc#SLE-16610).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- fs/minix: check return value of sb_getblk() (bsc#1179676).\n- fs/minix: do not allow getting deleted inodes (bsc#1179677).\n- fs/minix: fix block limit check for V1 filesystems (bsc#1179680).\n- fs/minix: reject too-large maximum file size (bsc#1179678).\n- fs/minix: remove expected error message in block_to_path() (bsc#1179681).\n- fs/minix: set s_maxbytes correctly (bsc#1179679).\n- fs/ufs: avoid potential u32 multiplication overflow (bsc#1179682).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- ftrace: Fix updating FTRACE_FL_TRAMP (git-fixes).\n- geneve: pull IP header before ECN decapsulation (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- genirq/matrix: Deal with the sillyness of for_each_cpu() on UP (bsc#1156315).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpio: mvebu: update Armada XP per-CPU comment (git-fixes).\n- i2c: i801: Fix the i2c-mux gpiod_lookup_table not being properly terminated (git-fixes).\n- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).\n- i2c: sprd: use a specific timeout to avoid system hang up issue (git-fixes).\n- i3c master: fix missing destroy_workqueue() on error in i3c_master_register (git-fixes).\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio:adc:ti-ads124s08: Fix alignment and data leak issues (git-fixes).\n- iio:adc:ti-ads124s08: Fix buffer being too long (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:light:rpr0521: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:light:st_uvis25: Fix timestamp alignment and prevent data leak (git-fixes).\n- iio:magnetometer:mag3110: Fix alignment and data leak issues (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- iomap: Clear page error before beginning a write (bsc#1179683).\n- iomap: Mark read blocks uptodate in write_begin (bsc#1179684).\n- iomap: Set all uptodate bits for an Uptodate page (bsc#1179685).\n- iommu-amd-Increase-interrupt-remapping-table-limit-t.patch: (bsc#1179652).\n- iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs (bsc#1179652).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: hook up missing RX handlers (git-fixes).\n- iwlwifi: pcie: add one missing entry for AX210 (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- jbd2: fix up sparse warnings in checkpoint code (bsc#1179707).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for USB audio driver (bsc#1178203).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kdb: Fix pager search for multi-line strings (git-fixes).\n- kernel/cpu: add arch override for clear_tasks_mm_cpumask() mm handling (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- kgdb: Drop malformed kernel doc comment (git-fixes).\n- lan743x: fix for potential NULL pointer dereference with bare card (git-fixes).\n- lib/string: remove unnecessary #undefs (git-fixes).\n- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).\n- locking/percpu-rwsem: Use this_cpu_{inc,dec}() for read_count (bsc#1149032).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- media: gp8psk: initialize stats at power control logic (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: imx214: Fix stop streaming (git-fixes).\n- media: ipu3-cio2: Make the field on subdev format V4L2_FIELD_NONE (git-fixes).\n- media: ipu3-cio2: Remove traces of returned buffers (git-fixes).\n- media: ipu3-cio2: Return actual subdev format (git-fixes).\n- media: ipu3-cio2: Serialise access to pad format (git-fixes).\n- media: ipu3-cio2: Validate mbus format in setting subdev format (git-fixes).\n- media: max2175: fix max2175_set_csm_mode() error code (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_dec_pm() (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_init_enc_pm() (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: tm6000: Fix sizeof() mismatches (git-fixes).\n- media: uvcvideo: Accept invalid bFormatIndex and bFrameIndex values (bsc#1180117).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/error_inject: Fix allow_error_inject function signatures (bsc#1179710).\n- mm/memory-failure: Add memory_failure_queue_kick() (jsc#SLE-16610).\n- mm/memory_hotplug: shrink zones when offlining memory (bsc#1177679).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- mm: memcg: fix memcg reclaim soft lockup (VM Functionality, bsc#1180056).\n- mmc: block: Fixup condition for CMD13 polling for RPMB requests (git-fixes).\n- mmc: pxamci: Fix error return code in pxamci_probe (git-fixes).\n- mtd: rawnand: gpmi: Fix the random DMA timeout issue (git-fixes).\n- mtd: rawnand: gpmi: fix reference count leak in gpmi ops (git-fixes).\n- mtd: rawnand: meson: Fix a resource leak in init (git-fixes).\n- mtd: rawnand: meson: fix meson_nfc_dma_buffer_release() arguments (git-fixes).\n- mtd: rawnand: qcom: Fix DMA sync on FLASH_STATUS register read (git-fixes).\n- mtd: spinand: Fix OOB read (git-fixes).\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- net: sctp: Rename fallthrough label to unhandled (bsc#1178203).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nvme-fabrics: allow to queue requests for live queues (git-fixes).\n- nvme-fabrics: do not check state NVME_CTRL_NEW for request acceptance (bsc#1179519).\n- nvme-fc: avoid calling _nvme_fc_abort_outstanding_ios from interrupt context (bsc#1177326).\n- nvme-fc: cancel async events before freeing event struct (git-fixes).\n- nvme-fc: eliminate terminate_io use by nvme_fc_error_recovery (bsc#1177326).\n- nvme-fc: fix error loop in create_hw_io_queues (git-fixes).\n- nvme-fc: fix io timeout to abort I/O (bsc#1177326).\n- nvme-fc: remove err_work work item (bsc#1177326).\n- nvme-fc: remove nvme_fc_terminate_io() (bsc#1177326).\n- nvme-fc: shorten reconnect delay if possible for FC (git-fixes).\n- nvme-fc: track error_recovery while connecting (bsc#1177326).\n- nvme-fc: wait for queues to freeze before calling (git-fixes).\n- nvme-force-complete-cancelled-requests.patch: (bsc#1175995,bsc#1178756,jsc#SLE-15608). Without this we can end up with a series of nvme QID timeouts, regardless of filesystem when fstests is used or any error injection mechanism is used. Without this fix, we end up with 9 failures on xfs, but due to its generic nature, will likely end up with other failures on other filesystems. This does not allow a clean slate reliable fstests run. This fixes that issue. Through code inspection I found these changes were already present on SLE15-SP3 but not on SLE15-SP2.\n- nvme-multipath: fix bogus request queue reference put (bsc#1175389).\n- nvme-multipath: fix deadlock between ana_work and scan_work (git-fixes).\n- nvme-multipath: fix deadlock due to head->lock (git-fixes).\n- nvme-pci: properly print controller address (git-fixes).\n- nvme-rdma: avoid race between time out and tear down (bsc#1179519).\n- nvme-rdma: avoid repeated request completion (bsc#1179519).\n- nvme-rdma: cancel async events before freeing event struct (git-fixes).\n- nvme-rdma: fix controller reset hang during traffic (bsc#1179519).\n- nvme-rdma: fix reset hang if controller died in the middle of a reset (bsc#1179519).\n- nvme-rdma: fix timeout handler (bsc#1179519).\n- nvme-rdma: handle unexpected nvme completion data length (bsc#1178612).\n- nvme-rdma: serialize controller teardown sequences (bsc#1179519).\n- nvme-tcp: avoid race between time out and tear down (bsc#1179519).\n- nvme-tcp: avoid repeated request completion (bsc#1179519).\n- nvme-tcp: avoid scheduling io_work if we are already polling (bsc#1179519).\n- nvme-tcp: break from io_work loop if recv failed (bsc#1179519).\n- nvme-tcp: cancel async events before freeing event struct (git-fixes).\n- nvme-tcp: do not poll a non-live queue (bsc#1179519).\n- nvme-tcp: fix controller reset hang during traffic (bsc#1179519).\n- nvme-tcp: fix possible crash in recv error flow (bsc#1179519).\n- nvme-tcp: fix possible leakage during error flow (git-fixes).\n- nvme-tcp: fix reset hang if controller died in the middle of a reset (bsc#1179519).\n- nvme-tcp: fix timeout handler (bsc#1179519).\n- nvme-tcp: have queue prod/cons send list become a llist (bsc#1179519).\n- nvme-tcp: leverage request plugging (bsc#1179519).\n- nvme-tcp: move send failure to nvme_tcp_try_send (bsc#1179519).\n- nvme-tcp: optimize network stack with setting msg flags (bsc#1179519).\n- nvme-tcp: optimize queue io_cpu assignment for multiple queue (git-fixes).\n- nvme-tcp: serialize controller teardown sequences (bsc#1179519).\n- nvme-tcp: set MSG_SENDPAGE_NOTLAST with MSG_MORE when we have (bsc#1179519).\n- nvme-tcp: try to send request in queue_rq context (bsc#1179519).\n- nvme-tcp: use bh_lock in data_ready (bsc#1179519).\n- nvme: Revert: Fix controller creation races with teardown (git-fixes).\n- nvme: do not protect ns mutation with ns->head->lock (git-fixes).\n- nvme: have nvme_wait_freeze_timeout return if it timed out (bsc#1179519).\n- nvme: introduce nvme_sync_io_queues (bsc#1179519).\n- nvmet-fc: fix missing check for no hostport struct (bsc#1176942).\n- nvmet-tcp: fix maxh2cdata icresp parameter (bsc#1179892).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: aspeed: Fix GPIO requests on pass-through banks (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- platform/chrome: cros_ec_spi: Do not overwrite spi::mode (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: intel-vbtn: Allow switch events on Acer Switch Alpha 12 (git-fixes).\n- platform/x86: intel-vbtn: Support for tablet mode on HP Pavilion 13 x360 PC (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- platform/x86: thinkpad_acpi: Add BAT1 is primary battery quirk for Thinkpad Yoga 11e 4th gen (git-fixes).\n- platform/x86: thinkpad_acpi: Do not report SW_TABLET_MODE on Yoga 11e (git-fixes).\n- platform/x86: touchscreen_dmi: Add info for the Irbis TW118 tablet (git-fixes).\n- power: supply: axp288_charger: Fix HP Pavilion x2 10 DMI matching (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/powernv: Fix memory corruption when saving SLB entries on MCE (jsc#SLE-9246 git-fixes).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix allnoconfig build since uaccess flush (bsc#1177666 git-fixes).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/64s: Trim offlined CPUs from mm_cpumasks (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() (bsc#1156395).\n- powerpc/eeh_cache: Fix a possible debugfs deadlock (bsc#1156395).\n- powerpc/numa: Fix a regression on memoryless node 0 (bsc#1179639 ltc#189002).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Avoid broken GCC __attribute__((optimize)) (bsc#1156395).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- pwm: zx: Add missing cleanup in error path (git-fixes).\n- qede: Notify qedr when mtu has changed (bsc#1152489)\n- qtnfmac: fix error return code in qtnf_pcie_probe() (git-fixes).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- r8169: work around power-saving bug on some chip versions (git-fixes).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regmap: debugfs: Fix a memory leak when calling regmap_attach_dev (git-fixes).\n- regmap: debugfs: Fix a reversed if statement in regmap_debugfs_init() (git-fixes).\n- regulator: axp20x: Fix DLDO2 voltage control register mask for AXP22x (git-fixes).\n- regulator: mcp16502: add linear_min_sel (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- remoteproc: q6v5-mss: fix error handling in q6v5_pds_enable (git-fixes).\n- remoteproc: qcom: Fix potential NULL dereference in adsp_init_mmio() (git-fixes).\n- remoteproc: qcom: fix reference leak in adsp_start (git-fixes).\n- rsi: fix error return code in rsi_reset_card() (git-fixes).\n- rtc: ep93xx: Fix NULL pointer dereference in ep93xx_rtc_read_time (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtc: pl031: fix resource leak in pl031_probe (git-fixes).\n- rtc: sun6i: Fix memleak in sun6i_rtc_clk_init (git-fixes).\n- rtw88: debug: Fix uninitialized memory in debugfs code (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: delay draining the TX buffers (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (bsc#1179604 LTC#190151).\n- s390: add 3f program exception handler (git-fixes).\n- samples/bpf: Remove unused test_ipip.sh (bsc#1155518).\n- samples: bpf: Refactor test_cgrp2_sock2 program with libbpf (bsc#1155518).\n- sched/fair: Check for idle core in wake_affine (git fixes (sched)).\n- sched/fair: Fix overutilized update in enqueue_task_fair() (git-fixes)\n- sched/fair: Fix race between runtime distribution and (git-fixes)\n- sched/fair: Fix wrong cpu selecting from isolated domain (git-fixes)\n- sched/fair: Refill bandwidth before scaling (git-fixes)\n- sched: correct SD_flags returned by tl->sd_flags() (git-fixes)\n- scsi: Remove unneeded break statements (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049).\n- scsi: core: Return BLK_STS_AGAIN for ALUA transitioning (bsc#1165933, bsc#1171000).\n- scsi: fnic: Avoid looping in TRANS ETH on unload (bsc#1175079).\n- scsi: fnic: Change shost_printk() to FNIC_FCS_DBG() (bsc#1175079).\n- scsi: fnic: Change shost_printk() to FNIC_MAIN_DBG() (bsc#1175079).\n- scsi: fnic: Set scsi_set_resid() only for underflow (bsc#1175079).\n- scsi: fnic: Validate io_req before others (bsc#1175079).\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix initial FLOGI failure due to BBSCN not supported (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Re-fix use after free in lpfc_rq_buf_free() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework remote port lock handling (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: Use generic power management (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_bsg: Provide correct documentation for a bunch of functions (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvme: Fix some kernel-doc related issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvme: Remove unused variable 'phba' (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_nvmet: Fix-up some formatting and doc-rot issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1175480 bsc#1176396 bsc#1176942 bsc#1177500).\n- scsi: mpt3sas: A small correction in _base_process_reply_queue (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add bypass_dirty_port_flag parameter (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add functions to check if any cmd is outstanding on Target and LUN (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Add module parameter multipath_on_hba (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Allocate memory for hba_port objects (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Bump driver version to 35.101.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Cancel the running work during host reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Capture IOC data for debugging purposes (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Define hba_port structure (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Detect tampered Aero and Sea adapters (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Disable DIF when prot_mask set to zero (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Do not call disable_irq from IRQ poll handler (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Do not change the DMA coherent mask after allocations (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Dump system registers for debugging (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix double free warnings (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix error returns in BRM_status_show (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix memset() in non-RDPQ mode (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix set but unused variable (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix sync irqs (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Fix unlock imbalance (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Get device objects using sas_address & portID (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Get sas_device objects using device's rphy (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handle vSES vphy object during HBA reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Handling HBA vSES device (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Memset config_cmds.reply buffer with zeros (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Postprocessing of target and LUN reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rearrange _scsih_mark_responding_sas_device() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove NULL check before freeing function (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove pci-dma-compat wrapper API (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Remove superfluous memset() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename and export interrupt mask/unmask functions (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename function name is_MSB_are_same (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Rename transport_del_phy_from_an_existing_port() (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Separate out RDPQ allocation to new function (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Set valid PhysicalPort in SMPPassThrough (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update driver version to 35.100.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update hba_port objects after host reset (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update hba_port's sas_address & phy_mask (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (jsc#SLE-16914, bsc#1177733).\n- scsi: mpt3sas: use true,false for bool variables (jsc#SLE-16914, bsc#1177733).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1171688 bsc#1172733). Replace patches.suse/qla2xxx-return-ebusy-on-fcport-deletion.patch with upstream version.\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1171688 bsc#1172733).\n- scsi: qla2xxx: Use constant when it is known (bsc#1171688 bsc#1172733). Refresh: - patches.suse/qla2xxx-return-ebusy-on-fcport-deletion.patch\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1171688 bsc#1172733).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1171688 bsc#1172733).\n- scsi_dh_alua: return BLK_STS_AGAIN for ALUA transitioning state (bsc#1165933, bsc#1171000).\n- scsi_dh_alua: set 'transitioning' state on unit attention (bsc#1171000, bsc#1165933).\n- selftest/bpf: Add missed ip6ip6 test back (bsc#1155518).\n- selftests/bpf/test_offload.py: Reset ethtool features after failed setting (bsc#1155518).\n- selftests/bpf: Fix invalid use of strncat in test_sockmap (bsc#1155518).\n- selftests/bpf: Print reason when a tester could not run a program (bsc#1155518).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- slimbus: qcom-ngd-ctrl: Avoid sending power requests without QMI (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: amlogic: canvas: add missing put_device() call in meson_canvas_get() (git-fixes).\n- soc: fsl: dpio: Get the cpumask through cpumask_of(cpu) (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: geni: More properly switch to DMA mode (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains() (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- speakup: fix uninitialized flush_lock (git-fixes).\n- spi: atmel-quadspi: Disable clock in probe error path (git-fixes).\n- spi: atmel-quadspi: Fix AHB memory accesses (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: fix resource leak for drivers without .remove callback (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: mt7621: Disable clock in probe error path (git-fixes).\n- spi: mt7621: fix missing clk_disable_unprepare() on error in mt7621_spi_probe (git-fixes).\n- spi: mxs: fix reference leak in mxs_spi_probe (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-nxp-fspi: fix fspi panic by unexpected interrupts (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: sprd: fix reference leak in sprd_spi_remove (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: stm32: FIFO threshold level - fix align packet size (git-fixes).\n- spi: stm32: fix reference leak in stm32_spi_resume (git-fixes).\n- spi: synquacer: Disable clock in probe error path (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: mt7621-dma: Fix a resource leak in an error handling path (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- swiotlb: fix 'x86: Do not panic if can not alloc buffer for swiotlb' (git-fixes).\n- swiotlb: using SIZE_MAX needs limits.h included (git-fixes).\n- thunderbolt: Fix use-after-free in remove_unplugged_switch() (git-fixes).\n- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).\n- tty: Fix ->session locking (bsc#1179745).\n- ubifs: Do not parse authentication mount options in remount process (bsc#1179688).\n- ubifs: Fix a memleak after dumping authentication mount options (bsc#1179687).\n- ubifs: Fix wrong orphan node deletion in ubifs_jnl_update|rename (bsc#1179675).\n- ubifs: dent: Fix some potential memory leaks while iterating entries (bsc#1179703).\n- ubifs: journal: Make sure to not dirty twice for auth nodes (bsc#1179704).\n- ubifs: mount_ubifs: Release authentication resource in error handling path (bsc#1179689).\n- ubifs: xattr: Fix some potential memory leaks while iterating entries (bsc#1179690).\n- udf: Fix memory leak when mounting (bsc#1179712).\n- usb/max3421: fix return error code in max3421_probe() (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).\n- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).\n- usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).\n- usb: gadget: select CONFIG_CRC32 (git-fixes).\n- usb: gadget: u_ether: Fix MTU size mismatch with RX packet size (git-fixes).\n- usb: host: ehci-tegra: Fix error handling in tegra_ehci_probe() (git-fixes).\n- usb: mtu3: fix memory corruption in mtu3_debugfs_regset() (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: usbip: vhci_hcd: protect shift size (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- video: fbdev: radeon: Fix memleak in radeonfb_pci_register (bsc#1152472)\n- video: fbdev: sis: fix null ptr dereference (bsc#1152472)\n- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).\n- watchdog: Fix potential dereferencing of null pointer (git-fixes).\n- watchdog: armada_37xx: Add missing dependency on HAS_IOMEM (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- watchdog: sprd: change to use usleep_range() instead of busy loop (git-fixes).\n- watchdog: sprd: check busy bit before new loading rather than after that (git-fixes).\n- watchdog: sprd: remove watchdog disable from resume fail path (git-fixes).\n- wil6210: select CONFIG_CRC32 (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- x86/CPU/AMD: Remove amd_get_nb_id() (bsc#1152489).\n- x86/CPU/AMD: Save AMD NodeId as cpu_die_id (bsc#1152489).\n- x86/apic/vector: Fix ordering in vector assignment (bsc#1156315).\n- x86/ima: use correct identifier for SetupMode variable (bsc#1152489).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1152489).\n- x86/mce: Do not overwrite no_way_out if mce_end() fails (bsc#1152489).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1152489).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1152489).\n- x86/mm/numa: Remove uninitialized_var() usage (bsc#1152489).\n- x86/mm: Fix leak of pmd ptlock (bsc#1152489).\n- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1152489).\n- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1152489).\n- x86/resctrl: Do not move a task to the same resource group (bsc#1152489).\n- x86/resctrl: Fix AMD L3 QOS CDP enable/disable (bsc#1152489).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1152489).\n- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1152489).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1152489).\n- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1152489).\n- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1152489).\n- x86/topology: Set cpu_die_id only if DIE_TYPE found (bsc#1152489).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1152489).\n- xhci-pci: Allow host runtime PM as default for Intel Alpine Ridge LP (git-fixes).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-60", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0060-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:0060-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:0060-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IGMHKFBCILMH7EZ36H75HXZ2RO2WG2GR/", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1149032", url: "https://bugzilla.suse.com/1149032", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1156315", url: "https://bugzilla.suse.com/1156315", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1158775", url: "https://bugzilla.suse.com/1158775", }, { category: "self", summary: "SUSE Bug 1161099", url: "https://bugzilla.suse.com/1161099", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1165933", url: "https://bugzilla.suse.com/1165933", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1171000", url: "https://bugzilla.suse.com/1171000", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1171688", url: "https://bugzilla.suse.com/1171688", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172733", url: "https://bugzilla.suse.com/1172733", }, { category: "self", summary: "SUSE Bug 1174486", url: "https://bugzilla.suse.com/1174486", }, { category: "self", summary: "SUSE Bug 1175079", url: "https://bugzilla.suse.com/1175079", }, { category: "self", summary: "SUSE Bug 1175389", url: "https://bugzilla.suse.com/1175389", }, { category: "self", summary: "SUSE Bug 1175480", url: "https://bugzilla.suse.com/1175480", }, { category: "self", summary: "SUSE Bug 1175995", url: "https://bugzilla.suse.com/1175995", }, { category: "self", summary: "SUSE Bug 1176396", url: "https://bugzilla.suse.com/1176396", }, { category: "self", summary: "SUSE Bug 1176846", url: "https://bugzilla.suse.com/1176846", }, { category: "self", summary: "SUSE Bug 1176942", url: "https://bugzilla.suse.com/1176942", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177500", url: "https://bugzilla.suse.com/1177500", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1177679", url: "https://bugzilla.suse.com/1177679", }, { category: "self", summary: "SUSE Bug 1177733", url: "https://bugzilla.suse.com/1177733", }, { category: "self", summary: "SUSE Bug 1178049", url: "https://bugzilla.suse.com/1178049", }, { category: "self", summary: "SUSE Bug 1178203", url: "https://bugzilla.suse.com/1178203", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178372", url: "https://bugzilla.suse.com/1178372", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178612", url: "https://bugzilla.suse.com/1178612", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178660", url: "https://bugzilla.suse.com/1178660", }, { category: "self", summary: "SUSE Bug 1178756", url: "https://bugzilla.suse.com/1178756", }, { category: "self", summary: "SUSE Bug 1178780", url: "https://bugzilla.suse.com/1178780", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179434", url: "https://bugzilla.suse.com/1179434", }, { category: "self", summary: "SUSE Bug 1179435", url: "https://bugzilla.suse.com/1179435", }, { category: "self", summary: "SUSE Bug 1179519", url: "https://bugzilla.suse.com/1179519", }, { category: "self", summary: "SUSE Bug 1179575", url: "https://bugzilla.suse.com/1179575", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179604", url: "https://bugzilla.suse.com/1179604", }, { category: "self", summary: "SUSE Bug 1179639", url: "https://bugzilla.suse.com/1179639", }, { category: "self", summary: "SUSE Bug 1179652", url: "https://bugzilla.suse.com/1179652", }, { category: "self", summary: "SUSE Bug 1179656", url: "https://bugzilla.suse.com/1179656", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179675", url: "https://bugzilla.suse.com/1179675", }, { category: "self", summary: "SUSE Bug 1179676", url: "https://bugzilla.suse.com/1179676", }, { category: "self", summary: "SUSE Bug 1179677", url: "https://bugzilla.suse.com/1179677", }, { category: "self", summary: "SUSE Bug 1179678", url: "https://bugzilla.suse.com/1179678", }, { category: "self", summary: "SUSE Bug 1179679", url: "https://bugzilla.suse.com/1179679", }, { category: "self", summary: "SUSE Bug 1179680", url: "https://bugzilla.suse.com/1179680", }, { category: "self", summary: "SUSE Bug 1179681", url: "https://bugzilla.suse.com/1179681", }, { category: "self", summary: "SUSE Bug 1179682", url: "https://bugzilla.suse.com/1179682", }, { category: "self", summary: "SUSE Bug 1179683", url: "https://bugzilla.suse.com/1179683", }, { category: "self", summary: "SUSE Bug 1179684", url: "https://bugzilla.suse.com/1179684", }, { category: "self", summary: "SUSE Bug 1179685", url: "https://bugzilla.suse.com/1179685", }, { category: "self", summary: "SUSE Bug 1179687", url: "https://bugzilla.suse.com/1179687", }, { category: "self", summary: "SUSE Bug 1179688", url: "https://bugzilla.suse.com/1179688", }, { category: "self", summary: "SUSE Bug 1179689", url: "https://bugzilla.suse.com/1179689", }, { category: "self", summary: "SUSE Bug 1179690", url: "https://bugzilla.suse.com/1179690", }, { category: "self", summary: "SUSE Bug 1179703", url: "https://bugzilla.suse.com/1179703", }, { category: "self", summary: "SUSE Bug 1179704", url: "https://bugzilla.suse.com/1179704", }, { category: "self", summary: "SUSE Bug 1179707", url: "https://bugzilla.suse.com/1179707", }, { category: "self", summary: "SUSE Bug 1179709", url: "https://bugzilla.suse.com/1179709", }, { category: "self", summary: "SUSE Bug 1179710", url: "https://bugzilla.suse.com/1179710", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179712", url: "https://bugzilla.suse.com/1179712", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179763", url: "https://bugzilla.suse.com/1179763", }, { category: "self", summary: "SUSE Bug 1179878", url: "https://bugzilla.suse.com/1179878", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179892", url: "https://bugzilla.suse.com/1179892", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180056", url: "https://bugzilla.suse.com/1180056", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180261", url: "https://bugzilla.suse.com/1180261", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE Bug 1180541", url: "https://bugzilla.suse.com/1180541", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180566", url: "https://bugzilla.suse.com/1180566", }, { category: "self", summary: "SUSE Bug 1180773", url: "https://bugzilla.suse.com/1180773", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-25639 page", url: "https://www.suse.com/security/cve/CVE-2020-25639/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-27830 page", url: "https://www.suse.com/security/cve/CVE-2020-27830/", }, { category: "self", summary: "SUSE CVE CVE-2020-27835 page", url: "https://www.suse.com/security/cve/CVE-2020-27835/", }, { category: "self", summary: "SUSE CVE CVE-2020-28374 page", url: "https://www.suse.com/security/cve/CVE-2020-28374/", }, { category: "self", summary: "SUSE CVE CVE-2020-29370 page", url: "https://www.suse.com/security/cve/CVE-2020-29370/", }, { category: "self", summary: "SUSE CVE CVE-2020-29373 page", url: "https://www.suse.com/security/cve/CVE-2020-29373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-14T21:44:26Z", generator: { date: "2021-01-14T21:44:26Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:0060-1", initial_release_date: "2021-01-14T21:44:26Z", revision_history: [ { date: "2021-01-14T21:44:26Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-5.3.18-lp152.60.1.noarch", product: { name: "kernel-devel-5.3.18-lp152.60.1.noarch", product_id: "kernel-devel-5.3.18-lp152.60.1.noarch", }, }, { category: "product_version", name: "kernel-docs-5.3.18-lp152.60.1.noarch", product: { name: "kernel-docs-5.3.18-lp152.60.1.noarch", product_id: "kernel-docs-5.3.18-lp152.60.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-5.3.18-lp152.60.1.noarch", product: { name: "kernel-docs-html-5.3.18-lp152.60.1.noarch", product_id: "kernel-docs-html-5.3.18-lp152.60.1.noarch", }, }, { category: "product_version", name: "kernel-macros-5.3.18-lp152.60.1.noarch", product: { name: "kernel-macros-5.3.18-lp152.60.1.noarch", product_id: "kernel-macros-5.3.18-lp152.60.1.noarch", }, }, { category: "product_version", name: "kernel-source-5.3.18-lp152.60.1.noarch", product: { name: "kernel-source-5.3.18-lp152.60.1.noarch", product_id: "kernel-source-5.3.18-lp152.60.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-5.3.18-lp152.60.1.noarch", product: { name: "kernel-source-vanilla-5.3.18-lp152.60.1.noarch", product_id: "kernel-source-vanilla-5.3.18-lp152.60.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-debug-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-debug-5.3.18-lp152.60.1.x86_64", product_id: "kernel-debug-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-debug-devel-5.3.18-lp152.60.1.x86_64", product_id: "kernel-debug-devel-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-default-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-default-5.3.18-lp152.60.1.x86_64", product_id: "kernel-default-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-default-devel-5.3.18-lp152.60.1.x86_64", product_id: "kernel-default-devel-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", product_id: "kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", product_id: "kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-obs-build-5.3.18-lp152.60.1.x86_64", product_id: "kernel-obs-build-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-obs-qa-5.3.18-lp152.60.1.x86_64", product_id: "kernel-obs-qa-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-preempt-5.3.18-lp152.60.1.x86_64", product_id: "kernel-preempt-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", product_id: "kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-5.3.18-lp152.60.1.x86_64", product: { name: "kernel-syms-5.3.18-lp152.60.1.x86_64", product_id: "kernel-syms-5.3.18-lp152.60.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-debug-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-debug-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-debug-devel-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-default-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-default-devel-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-5.3.18-lp152.60.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", }, product_reference: "kernel-devel-5.3.18-lp152.60.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-5.3.18-lp152.60.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", }, product_reference: "kernel-docs-5.3.18-lp152.60.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-5.3.18-lp152.60.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", }, product_reference: "kernel-docs-html-5.3.18-lp152.60.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-5.3.18-lp152.60.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", }, product_reference: "kernel-macros-5.3.18-lp152.60.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-obs-build-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-obs-qa-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-preempt-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-preempt-devel-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-5.3.18-lp152.60.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", }, product_reference: "kernel-source-5.3.18-lp152.60.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-5.3.18-lp152.60.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", }, product_reference: "kernel-source-vanilla-5.3.18-lp152.60.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-5.3.18-lp152.60.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", }, product_reference: "kernel-syms-5.3.18-lp152.60.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-25639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25639", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25639", url: "https://www.suse.com/security/cve/CVE-2020-25639", }, { category: "external", summary: "SUSE Bug 1176846 for CVE-2020-25639", url: "https://bugzilla.suse.com/1176846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "moderate", }, ], title: "CVE-2020-25639", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-27830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27830", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27830", url: "https://www.suse.com/security/cve/CVE-2020-27830", }, { category: "external", summary: "SUSE Bug 1179656 for CVE-2020-27830", url: "https://bugzilla.suse.com/1179656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "moderate", }, ], title: "CVE-2020-27830", }, { cve: "CVE-2020-27835", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27835", }, ], notes: [ { category: "general", text: "A use after free in the Linux kernel infiniband hfi1 driver in versions prior to 5.10-rc6 was found in the way user calls Ioctl after open dev file and fork. A local user could use this flaw to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27835", url: "https://www.suse.com/security/cve/CVE-2020-27835", }, { category: "external", summary: "SUSE Bug 1179878 for CVE-2020-27835", url: "https://bugzilla.suse.com/1179878", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "moderate", }, ], title: "CVE-2020-27835", }, { cve: "CVE-2020-28374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28374", }, ], notes: [ { category: "general", text: "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28374", url: "https://www.suse.com/security/cve/CVE-2020-28374", }, { category: "external", summary: "SUSE Bug 1178372 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178372", }, { category: "external", summary: "SUSE Bug 1178684 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178684", }, { category: "external", summary: "SUSE Bug 1180676 for CVE-2020-28374", url: "https://bugzilla.suse.com/1180676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-28374", }, { cve: "CVE-2020-29370", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29370", }, ], notes: [ { category: "general", text: "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29370", url: "https://www.suse.com/security/cve/CVE-2020-29370", }, { category: "external", summary: "SUSE Bug 1179435 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179435", }, { category: "external", summary: "SUSE Bug 1179648 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179648", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "moderate", }, ], title: "CVE-2020-29370", }, { cve: "CVE-2020-29373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29373", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29373", url: "https://www.suse.com/security/cve/CVE-2020-29373", }, { category: "external", summary: "SUSE Bug 1179434 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179434", }, { category: "external", summary: "SUSE Bug 1179779 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-29373", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.60.1.x86_64", "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.60.1.noarch", "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.60.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-14T21:44:26Z", details: "important", }, ], title: "CVE-2020-36158", }, ], }
opensuse-su-2021:0242-1
Vulnerability from csaf_opensuse
Published
2021-02-05 15:16
Modified
2021-02-05 15:16
Summary
Security update for RT kernel
Notes
Title of the patch
Security update for RT kernel
Description of the patch
This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.
This update was imported from the SUSE:SLE-15-SP2:Update update project.
Patchnames
openSUSE-2021-242
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for RT kernel", title: "Title of the patch", }, { category: "description", text: "\nThis update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2 codestream.\n \nThis update was imported from the SUSE:SLE-15-SP2:Update update project.", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-242", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0242-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:0242-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:0242-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/", }, { category: "self", summary: "SUSE Bug 1034995", url: "https://bugzilla.suse.com/1034995", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1043347", url: "https://bugzilla.suse.com/1043347", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1055014", url: "https://bugzilla.suse.com/1055014", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1055186", url: "https://bugzilla.suse.com/1055186", }, { category: "self", summary: "SUSE Bug 1058115", url: "https://bugzilla.suse.com/1058115", }, { category: "self", summary: "SUSE Bug 1061843", url: "https://bugzilla.suse.com/1061843", }, { category: "self", summary: "SUSE Bug 1065600", url: "https://bugzilla.suse.com/1065600", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1066382", url: "https://bugzilla.suse.com/1066382", }, { category: "self", summary: "SUSE Bug 1071995", url: "https://bugzilla.suse.com/1071995", }, { category: "self", summary: "SUSE Bug 1077428", url: "https://bugzilla.suse.com/1077428", }, { category: "self", summary: "SUSE Bug 1085030", url: "https://bugzilla.suse.com/1085030", }, { category: "self", summary: "SUSE Bug 1094244", url: "https://bugzilla.suse.com/1094244", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1120163", url: "https://bugzilla.suse.com/1120163", }, { category: "self", summary: "SUSE Bug 1129923", url: "https://bugzilla.suse.com/1129923", }, { category: "self", summary: "SUSE Bug 1133021", url: "https://bugzilla.suse.com/1133021", }, { category: "self", summary: "SUSE Bug 1134760", url: "https://bugzilla.suse.com/1134760", }, { category: "self", summary: "SUSE Bug 1136666", url: "https://bugzilla.suse.com/1136666", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1148868", url: "https://bugzilla.suse.com/1148868", }, { category: "self", summary: "SUSE Bug 1149032", url: "https://bugzilla.suse.com/1149032", }, { category: "self", summary: "SUSE Bug 1152148", url: "https://bugzilla.suse.com/1152148", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1152472", url: "https://bugzilla.suse.com/1152472", }, { category: "self", summary: "SUSE Bug 1152489", url: "https://bugzilla.suse.com/1152489", }, { category: "self", summary: "SUSE Bug 1153274", url: "https://bugzilla.suse.com/1153274", }, { category: "self", summary: "SUSE Bug 1154353", url: "https://bugzilla.suse.com/1154353", }, { category: "self", summary: "SUSE Bug 1154488", url: "https://bugzilla.suse.com/1154488", }, { category: "self", summary: "SUSE Bug 1154492", url: "https://bugzilla.suse.com/1154492", }, { category: "self", summary: "SUSE Bug 1154824", url: "https://bugzilla.suse.com/1154824", }, { category: "self", summary: "SUSE Bug 1155518", url: "https://bugzilla.suse.com/1155518", }, { category: "self", summary: "SUSE Bug 1155798", url: "https://bugzilla.suse.com/1155798", }, { category: "self", summary: "SUSE Bug 1156315", url: "https://bugzilla.suse.com/1156315", }, { category: "self", summary: "SUSE Bug 1156395", url: "https://bugzilla.suse.com/1156395", }, { category: "self", summary: "SUSE Bug 1157169", url: "https://bugzilla.suse.com/1157169", }, { category: "self", summary: "SUSE Bug 1158050", url: "https://bugzilla.suse.com/1158050", }, { category: "self", summary: "SUSE Bug 1158242", url: "https://bugzilla.suse.com/1158242", }, { category: "self", summary: "SUSE Bug 1158265", url: "https://bugzilla.suse.com/1158265", }, { category: "self", summary: "SUSE Bug 1158748", url: "https://bugzilla.suse.com/1158748", }, { category: "self", summary: "SUSE Bug 1158765", url: "https://bugzilla.suse.com/1158765", }, { category: "self", summary: "SUSE Bug 1158775", url: "https://bugzilla.suse.com/1158775", }, { category: "self", summary: "SUSE Bug 1158983", url: "https://bugzilla.suse.com/1158983", }, { category: "self", summary: "SUSE Bug 1159058", url: "https://bugzilla.suse.com/1159058", }, { category: "self", summary: "SUSE Bug 1159781", url: "https://bugzilla.suse.com/1159781", }, { category: "self", summary: "SUSE Bug 1159867", url: "https://bugzilla.suse.com/1159867", }, { category: "self", summary: "SUSE Bug 1159886", url: "https://bugzilla.suse.com/1159886", }, { category: "self", summary: "SUSE Bug 1160388", url: "https://bugzilla.suse.com/1160388", }, { category: "self", summary: "SUSE Bug 1160634", url: "https://bugzilla.suse.com/1160634", }, { category: "self", summary: "SUSE Bug 1160947", url: "https://bugzilla.suse.com/1160947", }, { category: "self", summary: "SUSE Bug 1161099", url: "https://bugzilla.suse.com/1161099", }, { category: "self", summary: "SUSE Bug 1161495", url: "https://bugzilla.suse.com/1161495", }, { category: "self", summary: "SUSE Bug 1162002", url: "https://bugzilla.suse.com/1162002", }, { category: "self", summary: "SUSE Bug 1162063", url: "https://bugzilla.suse.com/1162063", }, { category: "self", summary: "SUSE Bug 1162209", url: "https://bugzilla.suse.com/1162209", }, { category: "self", summary: "SUSE Bug 1162400", url: "https://bugzilla.suse.com/1162400", }, { category: "self", summary: "SUSE Bug 1162702", url: "https://bugzilla.suse.com/1162702", }, { category: "self", summary: "SUSE Bug 1163592", url: "https://bugzilla.suse.com/1163592", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1164648", url: "https://bugzilla.suse.com/1164648", }, { category: "self", summary: "SUSE Bug 1164777", url: "https://bugzilla.suse.com/1164777", }, { category: "self", summary: "SUSE Bug 1164780", url: "https://bugzilla.suse.com/1164780", }, { category: "self", summary: "SUSE Bug 1165211", url: "https://bugzilla.suse.com/1165211", }, { category: "self", summary: "SUSE Bug 1165455", url: "https://bugzilla.suse.com/1165455", }, { category: "self", summary: "SUSE Bug 1165629", url: "https://bugzilla.suse.com/1165629", }, { category: "self", summary: "SUSE Bug 1165692", url: "https://bugzilla.suse.com/1165692", }, { category: "self", summary: "SUSE Bug 1165933", url: "https://bugzilla.suse.com/1165933", }, { category: "self", summary: "SUSE Bug 1165975", url: "https://bugzilla.suse.com/1165975", }, { category: "self", summary: "SUSE Bug 1166146", url: "https://bugzilla.suse.com/1166146", }, { category: "self", summary: "SUSE Bug 1166166", url: "https://bugzilla.suse.com/1166166", }, { category: "self", summary: "SUSE Bug 1166340", url: "https://bugzilla.suse.com/1166340", }, { category: "self", summary: "SUSE Bug 1166965", url: "https://bugzilla.suse.com/1166965", }, { category: "self", summary: "SUSE Bug 1166985", url: "https://bugzilla.suse.com/1166985", }, { category: "self", summary: "SUSE Bug 1167030", url: "https://bugzilla.suse.com/1167030", }, { category: "self", summary: "SUSE Bug 1167104", url: "https://bugzilla.suse.com/1167104", }, { category: "self", summary: "SUSE Bug 1167527", url: "https://bugzilla.suse.com/1167527", }, { category: "self", summary: "SUSE Bug 1167651", url: "https://bugzilla.suse.com/1167651", }, { category: "self", summary: "SUSE Bug 1167657", url: "https://bugzilla.suse.com/1167657", }, { category: "self", summary: "SUSE Bug 1167773", url: "https://bugzilla.suse.com/1167773", }, { category: "self", summary: "SUSE Bug 1167851", url: "https://bugzilla.suse.com/1167851", }, { category: "self", summary: "SUSE Bug 1168230", url: "https://bugzilla.suse.com/1168230", }, { category: "self", summary: "SUSE Bug 1168461", url: "https://bugzilla.suse.com/1168461", }, { category: "self", summary: "SUSE Bug 1168468", url: "https://bugzilla.suse.com/1168468", }, { category: "self", summary: "SUSE Bug 1168779", url: "https://bugzilla.suse.com/1168779", }, { category: "self", summary: "SUSE Bug 1168838", url: "https://bugzilla.suse.com/1168838", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1168959", url: "https://bugzilla.suse.com/1168959", }, { category: "self", summary: "SUSE Bug 1169021", url: "https://bugzilla.suse.com/1169021", }, { category: "self", summary: "SUSE Bug 1169094", url: "https://bugzilla.suse.com/1169094", }, { category: "self", summary: "SUSE Bug 1169194", url: "https://bugzilla.suse.com/1169194", }, { category: "self", summary: "SUSE Bug 1169263", url: "https://bugzilla.suse.com/1169263", }, { category: "self", summary: "SUSE Bug 1169514", url: "https://bugzilla.suse.com/1169514", }, { category: "self", summary: "SUSE Bug 1169681", url: "https://bugzilla.suse.com/1169681", }, { category: "self", summary: "SUSE Bug 1169763", url: "https://bugzilla.suse.com/1169763", }, { category: "self", summary: "SUSE Bug 1169771", url: "https://bugzilla.suse.com/1169771", }, { category: "self", summary: "SUSE Bug 1169790", url: "https://bugzilla.suse.com/1169790", }, { category: "self", summary: "SUSE Bug 1169795", url: "https://bugzilla.suse.com/1169795", }, { category: "self", summary: "SUSE Bug 1170011", url: "https://bugzilla.suse.com/1170011", }, { category: "self", summary: "SUSE Bug 1170139", url: "https://bugzilla.suse.com/1170139", }, { category: "self", summary: "SUSE Bug 1170232", url: "https://bugzilla.suse.com/1170232", }, { category: "self", summary: "SUSE Bug 1170284", url: "https://bugzilla.suse.com/1170284", }, { category: "self", summary: "SUSE Bug 1170415", url: "https://bugzilla.suse.com/1170415", }, { category: "self", summary: "SUSE Bug 1170442", url: "https://bugzilla.suse.com/1170442", }, { category: "self", summary: "SUSE Bug 1170617", url: "https://bugzilla.suse.com/1170617", }, { category: "self", summary: "SUSE Bug 1170621", url: "https://bugzilla.suse.com/1170621", }, { category: "self", summary: "SUSE Bug 1170774", url: "https://bugzilla.suse.com/1170774", }, { category: "self", summary: "SUSE Bug 1170879", url: "https://bugzilla.suse.com/1170879", }, { category: "self", summary: "SUSE Bug 1170891", url: "https://bugzilla.suse.com/1170891", }, { category: "self", summary: "SUSE Bug 1170895", url: "https://bugzilla.suse.com/1170895", }, { category: "self", summary: "SUSE Bug 1171000", url: "https://bugzilla.suse.com/1171000", }, { category: "self", summary: "SUSE Bug 1171068", url: "https://bugzilla.suse.com/1171068", }, { category: "self", summary: "SUSE Bug 1171073", url: "https://bugzilla.suse.com/1171073", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1171117", url: "https://bugzilla.suse.com/1171117", }, { category: "self", summary: "SUSE Bug 1171150", url: "https://bugzilla.suse.com/1171150", }, { category: "self", summary: "SUSE Bug 1171156", url: "https://bugzilla.suse.com/1171156", }, { category: "self", summary: "SUSE Bug 1171189", url: "https://bugzilla.suse.com/1171189", }, { category: "self", summary: "SUSE Bug 1171191", url: "https://bugzilla.suse.com/1171191", }, { category: "self", summary: "SUSE Bug 1171218", url: "https://bugzilla.suse.com/1171218", }, { category: "self", summary: "SUSE Bug 1171219", url: "https://bugzilla.suse.com/1171219", }, { category: "self", summary: "SUSE Bug 1171220", url: "https://bugzilla.suse.com/1171220", }, { category: "self", summary: "SUSE Bug 1171236", url: "https://bugzilla.suse.com/1171236", }, { category: "self", summary: "SUSE Bug 1171242", url: "https://bugzilla.suse.com/1171242", }, { category: "self", summary: "SUSE Bug 1171246", url: "https://bugzilla.suse.com/1171246", }, { category: "self", summary: "SUSE Bug 1171285", url: "https://bugzilla.suse.com/1171285", }, { category: "self", summary: "SUSE Bug 1171293", url: "https://bugzilla.suse.com/1171293", }, { category: "self", summary: "SUSE Bug 1171374", url: "https://bugzilla.suse.com/1171374", }, { category: "self", summary: "SUSE Bug 1171390", url: "https://bugzilla.suse.com/1171390", }, { category: "self", summary: "SUSE Bug 1171391", url: "https://bugzilla.suse.com/1171391", }, { category: "self", summary: "SUSE Bug 1171392", url: "https://bugzilla.suse.com/1171392", }, { category: "self", summary: "SUSE Bug 1171417", url: "https://bugzilla.suse.com/1171417", }, { category: "self", summary: "SUSE Bug 1171426", url: "https://bugzilla.suse.com/1171426", }, { category: "self", summary: "SUSE Bug 1171507", url: "https://bugzilla.suse.com/1171507", }, { category: "self", summary: "SUSE Bug 1171513", url: "https://bugzilla.suse.com/1171513", }, { category: "self", summary: "SUSE Bug 1171514", url: "https://bugzilla.suse.com/1171514", }, { category: "self", summary: "SUSE Bug 1171529", url: "https://bugzilla.suse.com/1171529", }, { category: "self", summary: "SUSE Bug 1171530", url: "https://bugzilla.suse.com/1171530", }, { category: "self", summary: "SUSE Bug 1171558", url: "https://bugzilla.suse.com/1171558", }, { category: "self", summary: "SUSE Bug 1171634", url: "https://bugzilla.suse.com/1171634", }, { category: "self", summary: "SUSE Bug 1171644", url: "https://bugzilla.suse.com/1171644", }, { category: "self", summary: "SUSE Bug 1171662", url: "https://bugzilla.suse.com/1171662", }, { category: "self", summary: "SUSE Bug 1171675", url: "https://bugzilla.suse.com/1171675", }, { category: "self", summary: "SUSE Bug 1171688", url: "https://bugzilla.suse.com/1171688", }, { category: "self", summary: "SUSE Bug 1171699", url: "https://bugzilla.suse.com/1171699", }, { category: "self", summary: "SUSE Bug 1171709", url: "https://bugzilla.suse.com/1171709", }, { category: "self", summary: "SUSE Bug 1171730", url: "https://bugzilla.suse.com/1171730", }, { category: "self", summary: "SUSE Bug 1171732", url: "https://bugzilla.suse.com/1171732", }, { category: "self", summary: "SUSE Bug 1171736", url: "https://bugzilla.suse.com/1171736", }, { category: "self", summary: "SUSE Bug 1171739", url: "https://bugzilla.suse.com/1171739", }, { category: "self", summary: "SUSE Bug 1171742", url: "https://bugzilla.suse.com/1171742", }, { category: "self", summary: "SUSE Bug 1171743", url: "https://bugzilla.suse.com/1171743", }, { category: "self", summary: "SUSE Bug 1171759", url: "https://bugzilla.suse.com/1171759", }, { category: "self", summary: "SUSE Bug 1171773", url: "https://bugzilla.suse.com/1171773", }, { category: "self", summary: "SUSE Bug 1171774", url: "https://bugzilla.suse.com/1171774", }, { category: "self", summary: "SUSE Bug 1171775", url: "https://bugzilla.suse.com/1171775", }, { category: "self", summary: "SUSE Bug 1171776", url: "https://bugzilla.suse.com/1171776", }, { category: "self", summary: "SUSE Bug 1171777", url: "https://bugzilla.suse.com/1171777", }, { category: "self", summary: "SUSE Bug 1171778", url: "https://bugzilla.suse.com/1171778", }, { category: "self", summary: "SUSE Bug 1171779", url: "https://bugzilla.suse.com/1171779", }, { category: "self", summary: "SUSE Bug 1171780", url: "https://bugzilla.suse.com/1171780", }, { category: "self", summary: "SUSE Bug 1171781", url: "https://bugzilla.suse.com/1171781", }, { category: "self", summary: "SUSE Bug 1171782", url: "https://bugzilla.suse.com/1171782", }, { category: "self", summary: "SUSE Bug 1171783", url: "https://bugzilla.suse.com/1171783", }, { category: "self", summary: "SUSE Bug 1171784", url: "https://bugzilla.suse.com/1171784", }, { category: "self", summary: "SUSE Bug 1171785", url: "https://bugzilla.suse.com/1171785", }, { category: "self", summary: "SUSE Bug 1171786", url: "https://bugzilla.suse.com/1171786", }, { category: "self", summary: "SUSE Bug 1171787", url: "https://bugzilla.suse.com/1171787", }, { category: "self", summary: "SUSE Bug 1171788", url: "https://bugzilla.suse.com/1171788", }, { category: "self", summary: "SUSE Bug 1171789", url: "https://bugzilla.suse.com/1171789", }, { category: "self", summary: "SUSE Bug 1171790", url: "https://bugzilla.suse.com/1171790", }, { category: "self", summary: "SUSE Bug 1171791", url: "https://bugzilla.suse.com/1171791", }, { category: "self", summary: "SUSE Bug 1171792", url: "https://bugzilla.suse.com/1171792", }, { category: "self", summary: "SUSE Bug 1171793", url: "https://bugzilla.suse.com/1171793", }, { category: "self", summary: "SUSE Bug 1171794", url: "https://bugzilla.suse.com/1171794", }, { category: "self", summary: "SUSE Bug 1171795", url: "https://bugzilla.suse.com/1171795", }, { category: "self", summary: "SUSE Bug 1171796", url: "https://bugzilla.suse.com/1171796", }, { category: "self", summary: "SUSE Bug 1171797", url: "https://bugzilla.suse.com/1171797", }, { category: "self", summary: "SUSE Bug 1171798", url: "https://bugzilla.suse.com/1171798", }, { category: "self", summary: "SUSE Bug 1171799", url: "https://bugzilla.suse.com/1171799", }, { category: "self", summary: "SUSE Bug 1171810", url: "https://bugzilla.suse.com/1171810", }, { category: "self", summary: "SUSE Bug 1171827", url: "https://bugzilla.suse.com/1171827", }, { category: "self", summary: "SUSE Bug 1171828", url: "https://bugzilla.suse.com/1171828", }, { category: "self", summary: "SUSE Bug 1171832", url: "https://bugzilla.suse.com/1171832", }, { category: "self", summary: "SUSE Bug 1171833", url: "https://bugzilla.suse.com/1171833", }, { category: "self", summary: "SUSE Bug 1171834", url: "https://bugzilla.suse.com/1171834", }, { category: "self", summary: "SUSE Bug 1171835", url: "https://bugzilla.suse.com/1171835", }, { category: "self", summary: "SUSE Bug 1171839", url: "https://bugzilla.suse.com/1171839", }, { category: "self", summary: "SUSE Bug 1171840", url: "https://bugzilla.suse.com/1171840", }, { category: "self", summary: "SUSE Bug 1171841", url: "https://bugzilla.suse.com/1171841", }, { category: "self", summary: "SUSE Bug 1171842", url: "https://bugzilla.suse.com/1171842", }, { category: "self", summary: "SUSE Bug 1171843", url: "https://bugzilla.suse.com/1171843", }, { category: "self", summary: "SUSE Bug 1171844", url: "https://bugzilla.suse.com/1171844", }, { category: "self", summary: "SUSE Bug 1171849", url: "https://bugzilla.suse.com/1171849", }, { category: "self", summary: "SUSE Bug 1171857", url: "https://bugzilla.suse.com/1171857", }, { category: "self", summary: "SUSE Bug 1171868", url: "https://bugzilla.suse.com/1171868", }, { category: "self", summary: "SUSE Bug 1171904", url: "https://bugzilla.suse.com/1171904", }, { category: "self", summary: "SUSE Bug 1171915", url: "https://bugzilla.suse.com/1171915", }, { category: "self", summary: "SUSE Bug 1171982", url: "https://bugzilla.suse.com/1171982", }, { category: "self", summary: "SUSE Bug 1171983", url: "https://bugzilla.suse.com/1171983", }, { category: "self", summary: "SUSE Bug 1171988", url: "https://bugzilla.suse.com/1171988", }, { category: "self", summary: "SUSE Bug 1172017", url: "https://bugzilla.suse.com/1172017", }, { category: "self", summary: "SUSE Bug 1172046", url: "https://bugzilla.suse.com/1172046", }, { category: "self", summary: "SUSE Bug 1172061", url: "https://bugzilla.suse.com/1172061", }, { category: "self", summary: "SUSE Bug 1172062", url: "https://bugzilla.suse.com/1172062", }, { category: "self", summary: "SUSE Bug 1172063", url: "https://bugzilla.suse.com/1172063", }, { category: "self", summary: "SUSE Bug 1172064", url: "https://bugzilla.suse.com/1172064", }, { category: "self", summary: "SUSE Bug 1172065", url: "https://bugzilla.suse.com/1172065", }, { category: "self", summary: "SUSE Bug 1172066", url: "https://bugzilla.suse.com/1172066", }, { category: "self", summary: "SUSE Bug 1172067", url: "https://bugzilla.suse.com/1172067", }, { category: "self", summary: "SUSE Bug 1172068", url: "https://bugzilla.suse.com/1172068", }, { category: "self", summary: "SUSE Bug 1172069", url: "https://bugzilla.suse.com/1172069", }, { category: "self", summary: "SUSE Bug 1172073", url: "https://bugzilla.suse.com/1172073", }, { category: "self", summary: "SUSE Bug 1172086", url: "https://bugzilla.suse.com/1172086", }, { category: "self", summary: "SUSE Bug 1172095", url: "https://bugzilla.suse.com/1172095", }, { category: "self", summary: "SUSE Bug 1172108", url: "https://bugzilla.suse.com/1172108", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172169", url: "https://bugzilla.suse.com/1172169", }, { category: "self", summary: "SUSE Bug 1172170", url: "https://bugzilla.suse.com/1172170", }, { category: "self", summary: "SUSE Bug 1172197", url: "https://bugzilla.suse.com/1172197", }, { category: "self", summary: "SUSE Bug 1172201", url: "https://bugzilla.suse.com/1172201", }, { category: "self", summary: "SUSE Bug 1172208", url: "https://bugzilla.suse.com/1172208", }, { category: "self", summary: "SUSE Bug 1172223", url: "https://bugzilla.suse.com/1172223", }, { category: "self", summary: "SUSE Bug 1172247", url: "https://bugzilla.suse.com/1172247", }, { category: "self", summary: "SUSE Bug 1172317", url: "https://bugzilla.suse.com/1172317", }, { category: "self", summary: "SUSE Bug 1172342", url: "https://bugzilla.suse.com/1172342", }, { category: "self", summary: "SUSE Bug 1172343", url: "https://bugzilla.suse.com/1172343", }, { category: "self", summary: "SUSE Bug 1172344", url: "https://bugzilla.suse.com/1172344", }, { category: "self", summary: "SUSE Bug 1172365", url: "https://bugzilla.suse.com/1172365", }, { category: "self", summary: "SUSE Bug 1172366", url: "https://bugzilla.suse.com/1172366", }, { category: "self", summary: "SUSE Bug 1172374", url: "https://bugzilla.suse.com/1172374", }, { category: "self", summary: "SUSE Bug 1172391", url: "https://bugzilla.suse.com/1172391", }, { category: "self", summary: "SUSE Bug 1172393", url: "https://bugzilla.suse.com/1172393", }, { category: "self", summary: "SUSE Bug 1172394", url: "https://bugzilla.suse.com/1172394", }, { category: "self", summary: "SUSE Bug 1172418", url: "https://bugzilla.suse.com/1172418", }, { category: "self", summary: "SUSE Bug 1172419", url: "https://bugzilla.suse.com/1172419", }, { category: "self", summary: "SUSE Bug 1172453", url: "https://bugzilla.suse.com/1172453", }, { category: "self", summary: "SUSE Bug 1172458", url: "https://bugzilla.suse.com/1172458", }, { category: "self", summary: "SUSE Bug 1172467", url: "https://bugzilla.suse.com/1172467", }, { category: "self", summary: "SUSE Bug 1172484", url: "https://bugzilla.suse.com/1172484", }, { category: "self", summary: "SUSE Bug 1172537", url: "https://bugzilla.suse.com/1172537", }, { category: "self", summary: "SUSE Bug 1172543", url: "https://bugzilla.suse.com/1172543", }, { category: "self", summary: "SUSE Bug 1172687", url: "https://bugzilla.suse.com/1172687", }, { category: "self", summary: "SUSE Bug 1172719", url: "https://bugzilla.suse.com/1172719", }, { category: "self", summary: "SUSE Bug 1172733", url: "https://bugzilla.suse.com/1172733", }, { category: "self", summary: "SUSE Bug 1172739", url: "https://bugzilla.suse.com/1172739", }, { category: "self", summary: "SUSE Bug 1172751", url: "https://bugzilla.suse.com/1172751", }, { category: "self", summary: "SUSE Bug 1172757", url: "https://bugzilla.suse.com/1172757", }, { category: "self", summary: "SUSE Bug 1172759", url: "https://bugzilla.suse.com/1172759", }, { category: "self", summary: "SUSE Bug 1172775", url: "https://bugzilla.suse.com/1172775", }, { category: "self", summary: "SUSE Bug 1172781", url: "https://bugzilla.suse.com/1172781", }, { category: "self", summary: "SUSE Bug 1172782", url: "https://bugzilla.suse.com/1172782", }, { category: "self", summary: "SUSE Bug 1172783", url: "https://bugzilla.suse.com/1172783", }, { category: "self", summary: "SUSE Bug 1172814", url: "https://bugzilla.suse.com/1172814", }, { category: "self", summary: "SUSE Bug 1172823", url: "https://bugzilla.suse.com/1172823", }, { category: "self", summary: "SUSE Bug 1172841", url: "https://bugzilla.suse.com/1172841", }, { category: "self", summary: "SUSE Bug 1172871", url: "https://bugzilla.suse.com/1172871", }, { category: "self", summary: "SUSE Bug 1172873", url: "https://bugzilla.suse.com/1172873", }, { category: "self", summary: "SUSE Bug 1172938", url: "https://bugzilla.suse.com/1172938", }, { category: "self", summary: "SUSE Bug 1172939", url: "https://bugzilla.suse.com/1172939", }, { category: "self", summary: "SUSE Bug 1172940", url: "https://bugzilla.suse.com/1172940", }, { category: "self", summary: "SUSE Bug 1172956", url: "https://bugzilla.suse.com/1172956", }, { category: "self", summary: "SUSE Bug 1172963", url: "https://bugzilla.suse.com/1172963", }, { category: "self", summary: "SUSE Bug 1172983", url: "https://bugzilla.suse.com/1172983", }, { category: "self", summary: "SUSE Bug 1172984", url: "https://bugzilla.suse.com/1172984", }, { category: "self", summary: "SUSE Bug 1172985", url: "https://bugzilla.suse.com/1172985", }, { category: "self", summary: "SUSE Bug 1172986", url: "https://bugzilla.suse.com/1172986", }, { category: "self", summary: "SUSE Bug 1172987", url: "https://bugzilla.suse.com/1172987", }, { category: "self", summary: "SUSE Bug 1172988", url: "https://bugzilla.suse.com/1172988", }, { category: "self", summary: "SUSE Bug 1172989", url: "https://bugzilla.suse.com/1172989", }, { category: "self", summary: "SUSE Bug 1172990", url: "https://bugzilla.suse.com/1172990", }, { category: "self", summary: "SUSE Bug 1172999", url: "https://bugzilla.suse.com/1172999", }, { category: "self", summary: "SUSE Bug 1173017", url: "https://bugzilla.suse.com/1173017", }, { category: "self", summary: "SUSE Bug 1173068", url: "https://bugzilla.suse.com/1173068", }, { category: "self", summary: "SUSE Bug 1173074", url: "https://bugzilla.suse.com/1173074", }, { category: "self", summary: "SUSE Bug 1173085", url: "https://bugzilla.suse.com/1173085", }, { category: "self", summary: "SUSE Bug 1173115", url: "https://bugzilla.suse.com/1173115", }, { category: "self", summary: "SUSE Bug 1173139", url: "https://bugzilla.suse.com/1173139", }, { category: "self", summary: "SUSE Bug 1173206", url: "https://bugzilla.suse.com/1173206", }, { category: "self", summary: "SUSE Bug 1173267", url: "https://bugzilla.suse.com/1173267", }, { category: "self", summary: "SUSE Bug 1173271", url: "https://bugzilla.suse.com/1173271", }, { category: "self", summary: "SUSE Bug 1173280", url: "https://bugzilla.suse.com/1173280", }, { category: "self", summary: "SUSE Bug 1173284", url: "https://bugzilla.suse.com/1173284", }, { category: "self", summary: "SUSE Bug 1173428", url: "https://bugzilla.suse.com/1173428", }, { category: "self", summary: "SUSE Bug 1173438", url: "https://bugzilla.suse.com/1173438", }, { category: "self", summary: "SUSE Bug 1173461", url: "https://bugzilla.suse.com/1173461", }, { category: "self", summary: "SUSE Bug 1173468", url: "https://bugzilla.suse.com/1173468", }, { category: "self", summary: "SUSE Bug 1173485", url: "https://bugzilla.suse.com/1173485", }, { category: "self", summary: "SUSE Bug 1173514", url: "https://bugzilla.suse.com/1173514", }, { category: "self", summary: "SUSE Bug 1173552", url: "https://bugzilla.suse.com/1173552", }, { category: "self", summary: "SUSE Bug 1173573", url: "https://bugzilla.suse.com/1173573", }, { category: "self", summary: "SUSE Bug 1173625", url: "https://bugzilla.suse.com/1173625", }, { category: "self", summary: "SUSE Bug 1173746", url: "https://bugzilla.suse.com/1173746", }, { category: "self", summary: "SUSE Bug 1173776", url: "https://bugzilla.suse.com/1173776", }, { category: "self", summary: "SUSE Bug 1173798", url: "https://bugzilla.suse.com/1173798", }, { category: "self", summary: "SUSE Bug 1173813", url: "https://bugzilla.suse.com/1173813", }, { category: "self", summary: "SUSE Bug 1173817", url: "https://bugzilla.suse.com/1173817", }, { category: "self", summary: "SUSE Bug 1173818", url: "https://bugzilla.suse.com/1173818", }, { category: "self", summary: "SUSE Bug 1173820", url: "https://bugzilla.suse.com/1173820", }, { category: "self", summary: "SUSE Bug 1173822", url: "https://bugzilla.suse.com/1173822", }, { category: "self", summary: "SUSE Bug 1173823", url: "https://bugzilla.suse.com/1173823", }, { category: "self", summary: "SUSE Bug 1173824", url: "https://bugzilla.suse.com/1173824", }, { category: "self", summary: "SUSE Bug 1173825", url: "https://bugzilla.suse.com/1173825", }, { category: "self", summary: "SUSE Bug 1173826", url: "https://bugzilla.suse.com/1173826", }, { category: "self", summary: "SUSE Bug 1173827", url: "https://bugzilla.suse.com/1173827", }, { category: "self", summary: "SUSE Bug 1173828", url: "https://bugzilla.suse.com/1173828", }, { category: "self", summary: "SUSE Bug 1173830", url: "https://bugzilla.suse.com/1173830", }, { category: "self", summary: "SUSE Bug 1173831", url: "https://bugzilla.suse.com/1173831", }, { category: "self", summary: "SUSE Bug 1173832", url: "https://bugzilla.suse.com/1173832", }, { category: "self", summary: "SUSE Bug 1173833", url: "https://bugzilla.suse.com/1173833", }, { category: "self", summary: "SUSE Bug 1173834", url: "https://bugzilla.suse.com/1173834", }, { category: "self", summary: "SUSE Bug 1173836", url: "https://bugzilla.suse.com/1173836", }, { category: "self", summary: "SUSE Bug 1173837", url: "https://bugzilla.suse.com/1173837", }, { category: "self", summary: "SUSE Bug 1173838", url: "https://bugzilla.suse.com/1173838", }, { category: "self", summary: "SUSE Bug 1173839", url: "https://bugzilla.suse.com/1173839", }, { category: "self", summary: "SUSE Bug 1173841", url: "https://bugzilla.suse.com/1173841", }, { category: "self", summary: "SUSE Bug 1173843", url: "https://bugzilla.suse.com/1173843", }, { category: "self", summary: "SUSE Bug 1173844", url: "https://bugzilla.suse.com/1173844", }, { category: "self", summary: "SUSE Bug 1173845", url: "https://bugzilla.suse.com/1173845", }, { category: "self", summary: "SUSE Bug 1173847", url: "https://bugzilla.suse.com/1173847", }, { category: "self", summary: "SUSE Bug 1173849", url: "https://bugzilla.suse.com/1173849", }, { category: "self", summary: "SUSE Bug 1173860", url: "https://bugzilla.suse.com/1173860", }, { category: "self", summary: "SUSE Bug 1173894", url: "https://bugzilla.suse.com/1173894", }, { category: "self", summary: "SUSE Bug 1173941", url: "https://bugzilla.suse.com/1173941", }, { category: "self", summary: "SUSE Bug 1173954", url: "https://bugzilla.suse.com/1173954", }, { category: "self", summary: "SUSE Bug 1174002", url: "https://bugzilla.suse.com/1174002", }, { category: "self", summary: "SUSE Bug 1174003", url: "https://bugzilla.suse.com/1174003", }, { category: "self", summary: "SUSE Bug 1174018", url: "https://bugzilla.suse.com/1174018", }, { category: "self", summary: "SUSE Bug 1174026", url: "https://bugzilla.suse.com/1174026", }, { category: "self", summary: "SUSE Bug 1174029", url: "https://bugzilla.suse.com/1174029", }, { category: "self", summary: "SUSE Bug 1174072", url: "https://bugzilla.suse.com/1174072", }, { category: "self", summary: "SUSE Bug 1174098", url: "https://bugzilla.suse.com/1174098", }, { category: "self", summary: "SUSE Bug 1174110", url: "https://bugzilla.suse.com/1174110", }, { category: "self", summary: "SUSE Bug 1174111", url: "https://bugzilla.suse.com/1174111", }, { category: "self", summary: "SUSE Bug 1174116", url: "https://bugzilla.suse.com/1174116", }, { category: "self", summary: "SUSE Bug 1174126", url: "https://bugzilla.suse.com/1174126", }, { category: "self", summary: "SUSE Bug 1174127", url: "https://bugzilla.suse.com/1174127", }, { category: "self", summary: "SUSE Bug 1174128", url: "https://bugzilla.suse.com/1174128", }, { category: "self", summary: "SUSE Bug 1174129", url: "https://bugzilla.suse.com/1174129", }, { category: "self", summary: "SUSE Bug 1174146", url: "https://bugzilla.suse.com/1174146", }, { category: "self", summary: "SUSE Bug 1174185", url: "https://bugzilla.suse.com/1174185", }, { category: "self", summary: "SUSE Bug 1174205", url: "https://bugzilla.suse.com/1174205", }, { category: "self", summary: "SUSE Bug 1174244", url: "https://bugzilla.suse.com/1174244", }, { category: "self", summary: "SUSE Bug 1174263", url: "https://bugzilla.suse.com/1174263", }, { category: "self", summary: "SUSE Bug 1174264", url: "https://bugzilla.suse.com/1174264", }, { category: "self", summary: "SUSE Bug 1174331", url: "https://bugzilla.suse.com/1174331", }, { category: "self", summary: "SUSE Bug 1174332", url: "https://bugzilla.suse.com/1174332", }, { category: "self", summary: "SUSE Bug 1174333", url: "https://bugzilla.suse.com/1174333", }, { category: "self", summary: "SUSE Bug 1174345", url: "https://bugzilla.suse.com/1174345", }, { category: "self", summary: "SUSE Bug 1174356", url: "https://bugzilla.suse.com/1174356", }, { category: "self", summary: "SUSE Bug 1174358", url: "https://bugzilla.suse.com/1174358", }, { category: "self", summary: "SUSE Bug 1174362", url: "https://bugzilla.suse.com/1174362", }, { category: "self", summary: "SUSE Bug 1174387", url: "https://bugzilla.suse.com/1174387", }, { category: "self", summary: "SUSE Bug 1174396", url: "https://bugzilla.suse.com/1174396", }, { category: "self", summary: "SUSE Bug 1174398", url: "https://bugzilla.suse.com/1174398", }, { category: "self", summary: "SUSE Bug 1174407", url: "https://bugzilla.suse.com/1174407", }, { category: "self", summary: "SUSE Bug 1174409", url: "https://bugzilla.suse.com/1174409", }, { category: "self", summary: "SUSE Bug 1174411", url: "https://bugzilla.suse.com/1174411", }, { category: "self", summary: "SUSE Bug 1174438", url: "https://bugzilla.suse.com/1174438", }, { category: "self", summary: "SUSE Bug 1174462", url: "https://bugzilla.suse.com/1174462", }, { category: "self", summary: "SUSE Bug 1174484", url: "https://bugzilla.suse.com/1174484", }, { category: "self", summary: "SUSE Bug 1174486", url: "https://bugzilla.suse.com/1174486", }, { category: "self", summary: "SUSE Bug 1174513", url: "https://bugzilla.suse.com/1174513", }, { category: "self", summary: "SUSE Bug 1174527", url: "https://bugzilla.suse.com/1174527", }, { category: "self", summary: "SUSE Bug 1174625", url: "https://bugzilla.suse.com/1174625", }, { category: "self", summary: "SUSE Bug 1174627", url: "https://bugzilla.suse.com/1174627", }, { category: "self", summary: "SUSE Bug 1174645", url: "https://bugzilla.suse.com/1174645", }, { category: "self", summary: "SUSE Bug 1174689", url: "https://bugzilla.suse.com/1174689", }, { category: "self", summary: "SUSE Bug 1174699", url: "https://bugzilla.suse.com/1174699", }, { category: "self", summary: "SUSE Bug 1174737", url: "https://bugzilla.suse.com/1174737", }, { category: "self", summary: "SUSE Bug 1174748", url: "https://bugzilla.suse.com/1174748", }, { category: "self", summary: "SUSE Bug 1174757", url: "https://bugzilla.suse.com/1174757", }, { category: "self", summary: "SUSE Bug 1174762", url: "https://bugzilla.suse.com/1174762", }, { category: "self", summary: "SUSE Bug 1174770", url: "https://bugzilla.suse.com/1174770", }, { category: "self", summary: "SUSE Bug 1174771", url: "https://bugzilla.suse.com/1174771", }, { category: "self", summary: "SUSE Bug 1174777", url: "https://bugzilla.suse.com/1174777", }, { category: "self", summary: "SUSE Bug 1174805", url: "https://bugzilla.suse.com/1174805", }, { category: "self", summary: "SUSE Bug 1174824", url: "https://bugzilla.suse.com/1174824", }, { category: "self", summary: "SUSE Bug 1174825", url: "https://bugzilla.suse.com/1174825", }, { category: "self", summary: "SUSE Bug 1174852", url: "https://bugzilla.suse.com/1174852", }, { category: "self", summary: "SUSE Bug 1174865", url: "https://bugzilla.suse.com/1174865", }, { category: "self", summary: "SUSE Bug 1174880", url: "https://bugzilla.suse.com/1174880", }, { category: "self", summary: "SUSE Bug 1174897", url: "https://bugzilla.suse.com/1174897", }, { category: "self", summary: "SUSE Bug 1174899", url: "https://bugzilla.suse.com/1174899", }, { category: "self", summary: "SUSE Bug 1174906", url: "https://bugzilla.suse.com/1174906", }, { category: "self", summary: "SUSE Bug 1174969", url: "https://bugzilla.suse.com/1174969", }, { category: "self", summary: "SUSE Bug 1175009", url: "https://bugzilla.suse.com/1175009", }, { category: "self", summary: "SUSE Bug 1175010", url: "https://bugzilla.suse.com/1175010", }, { category: "self", summary: "SUSE Bug 1175011", url: "https://bugzilla.suse.com/1175011", }, { category: "self", summary: "SUSE Bug 1175012", url: "https://bugzilla.suse.com/1175012", }, { category: "self", summary: "SUSE Bug 1175013", url: "https://bugzilla.suse.com/1175013", }, { category: "self", summary: "SUSE Bug 1175014", url: "https://bugzilla.suse.com/1175014", }, { category: "self", summary: "SUSE Bug 1175015", url: "https://bugzilla.suse.com/1175015", }, { category: "self", summary: "SUSE Bug 1175016", url: "https://bugzilla.suse.com/1175016", }, { category: "self", summary: "SUSE Bug 1175017", url: "https://bugzilla.suse.com/1175017", }, { category: "self", summary: "SUSE Bug 1175018", url: "https://bugzilla.suse.com/1175018", }, { category: "self", summary: "SUSE Bug 1175019", url: "https://bugzilla.suse.com/1175019", }, { category: "self", summary: "SUSE Bug 1175020", url: "https://bugzilla.suse.com/1175020", }, { category: "self", summary: "SUSE Bug 1175021", url: "https://bugzilla.suse.com/1175021", }, { category: "self", summary: "SUSE Bug 1175052", url: "https://bugzilla.suse.com/1175052", }, { category: "self", summary: "SUSE Bug 1175079", url: "https://bugzilla.suse.com/1175079", }, { category: "self", summary: "SUSE Bug 1175112", url: "https://bugzilla.suse.com/1175112", }, { category: "self", summary: "SUSE Bug 1175116", url: "https://bugzilla.suse.com/1175116", }, { category: "self", summary: "SUSE Bug 1175128", url: "https://bugzilla.suse.com/1175128", }, { category: "self", summary: "SUSE Bug 1175149", url: "https://bugzilla.suse.com/1175149", }, { category: "self", summary: "SUSE Bug 1175175", url: "https://bugzilla.suse.com/1175175", }, { category: "self", summary: "SUSE Bug 1175176", url: "https://bugzilla.suse.com/1175176", }, { category: "self", summary: "SUSE Bug 1175180", url: "https://bugzilla.suse.com/1175180", }, { category: "self", summary: "SUSE Bug 1175181", url: "https://bugzilla.suse.com/1175181", }, { category: "self", summary: "SUSE Bug 1175182", url: "https://bugzilla.suse.com/1175182", }, { category: "self", summary: "SUSE Bug 1175183", url: "https://bugzilla.suse.com/1175183", }, { category: "self", summary: "SUSE Bug 1175184", url: "https://bugzilla.suse.com/1175184", }, { category: "self", summary: "SUSE Bug 1175185", url: "https://bugzilla.suse.com/1175185", }, { category: "self", summary: "SUSE Bug 1175186", url: "https://bugzilla.suse.com/1175186", }, { category: "self", summary: "SUSE Bug 1175187", url: "https://bugzilla.suse.com/1175187", }, { category: "self", summary: "SUSE Bug 1175188", url: "https://bugzilla.suse.com/1175188", }, { category: "self", summary: "SUSE Bug 1175189", url: "https://bugzilla.suse.com/1175189", }, { category: "self", summary: "SUSE Bug 1175190", url: "https://bugzilla.suse.com/1175190", }, { category: "self", summary: "SUSE Bug 1175191", url: "https://bugzilla.suse.com/1175191", }, { category: "self", summary: "SUSE Bug 1175192", url: "https://bugzilla.suse.com/1175192", }, { category: "self", summary: "SUSE Bug 1175195", url: "https://bugzilla.suse.com/1175195", }, { category: "self", summary: "SUSE Bug 1175199", url: "https://bugzilla.suse.com/1175199", }, { category: "self", summary: "SUSE Bug 1175213", url: "https://bugzilla.suse.com/1175213", }, { category: "self", summary: "SUSE Bug 1175232", url: "https://bugzilla.suse.com/1175232", }, { category: "self", summary: "SUSE Bug 1175263", url: "https://bugzilla.suse.com/1175263", }, { category: "self", summary: "SUSE Bug 1175284", url: "https://bugzilla.suse.com/1175284", }, { category: "self", summary: "SUSE Bug 1175296", url: "https://bugzilla.suse.com/1175296", }, { category: "self", summary: "SUSE Bug 1175306", url: "https://bugzilla.suse.com/1175306", }, { category: "self", summary: "SUSE Bug 1175344", url: "https://bugzilla.suse.com/1175344", }, { category: "self", summary: "SUSE Bug 1175345", url: "https://bugzilla.suse.com/1175345", }, { category: "self", summary: "SUSE Bug 1175346", url: "https://bugzilla.suse.com/1175346", }, { category: "self", summary: "SUSE Bug 1175347", url: "https://bugzilla.suse.com/1175347", }, { category: "self", summary: "SUSE Bug 1175367", url: "https://bugzilla.suse.com/1175367", }, { category: "self", summary: "SUSE Bug 1175377", url: "https://bugzilla.suse.com/1175377", }, { category: "self", summary: "SUSE Bug 1175440", url: "https://bugzilla.suse.com/1175440", }, { category: "self", summary: "SUSE Bug 1175480", url: "https://bugzilla.suse.com/1175480", }, { category: "self", summary: "SUSE Bug 1175493", url: "https://bugzilla.suse.com/1175493", }, { category: "self", summary: "SUSE Bug 1175546", url: "https://bugzilla.suse.com/1175546", }, { category: "self", summary: "SUSE Bug 1175550", url: "https://bugzilla.suse.com/1175550", }, { category: "self", summary: "SUSE Bug 1175599", url: "https://bugzilla.suse.com/1175599", }, { category: "self", summary: "SUSE Bug 1175621", url: "https://bugzilla.suse.com/1175621", }, { category: "self", summary: "SUSE Bug 1175654", url: "https://bugzilla.suse.com/1175654", }, { category: "self", summary: "SUSE Bug 1175667", url: "https://bugzilla.suse.com/1175667", }, { category: "self", summary: "SUSE Bug 1175691", url: "https://bugzilla.suse.com/1175691", }, { category: "self", summary: "SUSE Bug 1175718", url: "https://bugzilla.suse.com/1175718", }, { category: "self", summary: "SUSE Bug 1175721", url: "https://bugzilla.suse.com/1175721", }, { category: "self", summary: "SUSE Bug 1175749", url: "https://bugzilla.suse.com/1175749", }, { category: "self", summary: "SUSE Bug 1175768", url: "https://bugzilla.suse.com/1175768", }, { category: "self", summary: "SUSE Bug 1175769", url: "https://bugzilla.suse.com/1175769", }, { category: "self", summary: "SUSE Bug 1175770", url: "https://bugzilla.suse.com/1175770", }, { category: "self", summary: "SUSE Bug 1175771", url: "https://bugzilla.suse.com/1175771", }, { category: "self", summary: "SUSE Bug 1175772", url: "https://bugzilla.suse.com/1175772", }, { category: "self", summary: "SUSE Bug 1175774", url: "https://bugzilla.suse.com/1175774", }, { category: "self", summary: "SUSE Bug 1175775", url: "https://bugzilla.suse.com/1175775", }, { category: "self", summary: "SUSE Bug 1175787", url: "https://bugzilla.suse.com/1175787", }, { category: "self", summary: "SUSE Bug 1175807", url: "https://bugzilla.suse.com/1175807", }, { category: "self", summary: "SUSE Bug 1175834", url: "https://bugzilla.suse.com/1175834", }, { category: "self", summary: "SUSE Bug 1175873", url: "https://bugzilla.suse.com/1175873", }, { category: "self", summary: "SUSE Bug 1175882", url: "https://bugzilla.suse.com/1175882", }, { category: "self", summary: "SUSE Bug 1175898", url: "https://bugzilla.suse.com/1175898", }, { category: "self", summary: "SUSE Bug 1175918", url: "https://bugzilla.suse.com/1175918", }, { category: "self", summary: "SUSE Bug 1175952", url: "https://bugzilla.suse.com/1175952", }, { category: "self", summary: "SUSE Bug 1175995", url: "https://bugzilla.suse.com/1175995", }, { category: "self", summary: "SUSE Bug 1175996", url: "https://bugzilla.suse.com/1175996", }, { category: "self", summary: "SUSE Bug 1175997", url: "https://bugzilla.suse.com/1175997", }, { category: "self", summary: "SUSE Bug 1175998", url: "https://bugzilla.suse.com/1175998", }, { category: "self", summary: "SUSE Bug 1175999", url: "https://bugzilla.suse.com/1175999", }, { category: "self", summary: "SUSE Bug 1176000", url: "https://bugzilla.suse.com/1176000", }, { category: "self", summary: "SUSE Bug 1176001", url: "https://bugzilla.suse.com/1176001", }, { category: "self", summary: "SUSE Bug 1176019", url: "https://bugzilla.suse.com/1176019", }, { category: "self", summary: "SUSE Bug 1176022", url: "https://bugzilla.suse.com/1176022", }, { category: "self", summary: "SUSE Bug 1176038", url: "https://bugzilla.suse.com/1176038", }, { category: "self", summary: "SUSE Bug 1176063", url: "https://bugzilla.suse.com/1176063", }, { category: "self", summary: "SUSE Bug 1176069", url: "https://bugzilla.suse.com/1176069", }, { category: "self", summary: "SUSE Bug 1176109", url: "https://bugzilla.suse.com/1176109", }, { category: "self", summary: "SUSE Bug 1176137", url: "https://bugzilla.suse.com/1176137", }, { category: "self", summary: "SUSE Bug 1176180", url: "https://bugzilla.suse.com/1176180", }, { category: "self", summary: "SUSE Bug 1176200", url: "https://bugzilla.suse.com/1176200", }, { category: "self", summary: "SUSE Bug 1176235", url: "https://bugzilla.suse.com/1176235", }, { category: "self", summary: "SUSE Bug 1176236", url: "https://bugzilla.suse.com/1176236", }, { category: "self", summary: "SUSE Bug 1176237", url: "https://bugzilla.suse.com/1176237", }, { category: "self", summary: "SUSE Bug 1176242", url: "https://bugzilla.suse.com/1176242", }, { category: "self", summary: "SUSE Bug 1176354", url: "https://bugzilla.suse.com/1176354", }, { category: "self", summary: "SUSE Bug 1176357", url: "https://bugzilla.suse.com/1176357", }, { category: "self", summary: "SUSE Bug 1176358", url: "https://bugzilla.suse.com/1176358", }, { category: "self", summary: "SUSE Bug 1176359", url: "https://bugzilla.suse.com/1176359", }, { category: "self", summary: "SUSE Bug 1176360", url: "https://bugzilla.suse.com/1176360", }, { category: "self", summary: "SUSE Bug 1176361", url: "https://bugzilla.suse.com/1176361", }, { category: "self", summary: "SUSE Bug 1176362", url: "https://bugzilla.suse.com/1176362", }, { category: "self", summary: "SUSE Bug 1176363", url: "https://bugzilla.suse.com/1176363", }, { category: "self", summary: "SUSE Bug 1176364", url: "https://bugzilla.suse.com/1176364", }, { category: "self", summary: "SUSE Bug 1176365", url: "https://bugzilla.suse.com/1176365", }, { category: "self", summary: "SUSE Bug 1176366", url: "https://bugzilla.suse.com/1176366", }, { category: "self", summary: "SUSE Bug 1176367", url: "https://bugzilla.suse.com/1176367", }, { category: "self", summary: "SUSE Bug 1176381", url: "https://bugzilla.suse.com/1176381", }, { category: "self", summary: "SUSE Bug 1176396", url: "https://bugzilla.suse.com/1176396", }, { category: "self", summary: "SUSE Bug 1176400", url: "https://bugzilla.suse.com/1176400", }, { category: "self", summary: "SUSE Bug 1176423", url: "https://bugzilla.suse.com/1176423", }, { category: "self", summary: "SUSE Bug 1176449", url: "https://bugzilla.suse.com/1176449", }, { category: "self", summary: "SUSE Bug 1176481", url: "https://bugzilla.suse.com/1176481", }, { category: "self", summary: "SUSE Bug 1176485", url: "https://bugzilla.suse.com/1176485", }, { category: "self", summary: "SUSE Bug 1176486", url: "https://bugzilla.suse.com/1176486", }, { category: "self", summary: "SUSE Bug 1176507", url: "https://bugzilla.suse.com/1176507", }, { category: "self", summary: "SUSE Bug 1176536", url: "https://bugzilla.suse.com/1176536", }, { category: "self", summary: "SUSE Bug 1176537", url: "https://bugzilla.suse.com/1176537", }, { category: "self", summary: "SUSE Bug 1176538", url: "https://bugzilla.suse.com/1176538", }, { category: "self", summary: "SUSE Bug 1176539", url: "https://bugzilla.suse.com/1176539", }, { category: "self", summary: "SUSE Bug 1176540", url: "https://bugzilla.suse.com/1176540", }, { category: "self", summary: "SUSE Bug 1176541", url: "https://bugzilla.suse.com/1176541", }, { category: "self", summary: "SUSE Bug 1176542", url: "https://bugzilla.suse.com/1176542", }, { category: "self", summary: "SUSE Bug 1176543", url: "https://bugzilla.suse.com/1176543", }, { category: "self", summary: "SUSE Bug 1176544", url: "https://bugzilla.suse.com/1176544", }, { category: "self", summary: "SUSE Bug 1176545", url: "https://bugzilla.suse.com/1176545", }, { category: "self", summary: "SUSE Bug 1176546", url: "https://bugzilla.suse.com/1176546", }, { category: "self", summary: "SUSE Bug 1176548", url: "https://bugzilla.suse.com/1176548", }, { category: "self", summary: "SUSE Bug 1176558", url: "https://bugzilla.suse.com/1176558", }, { category: "self", summary: "SUSE Bug 1176559", url: "https://bugzilla.suse.com/1176559", }, { category: "self", summary: "SUSE Bug 1176564", url: "https://bugzilla.suse.com/1176564", }, { category: "self", summary: "SUSE Bug 1176586", url: "https://bugzilla.suse.com/1176586", }, { category: "self", summary: "SUSE Bug 1176587", url: "https://bugzilla.suse.com/1176587", }, { category: "self", summary: "SUSE Bug 1176588", url: "https://bugzilla.suse.com/1176588", }, { category: "self", summary: "SUSE Bug 1176659", url: "https://bugzilla.suse.com/1176659", }, { category: "self", summary: "SUSE Bug 1176698", url: "https://bugzilla.suse.com/1176698", }, { category: "self", summary: "SUSE Bug 1176699", url: "https://bugzilla.suse.com/1176699", }, { category: "self", summary: "SUSE Bug 1176700", url: "https://bugzilla.suse.com/1176700", }, { category: "self", summary: "SUSE Bug 1176713", url: "https://bugzilla.suse.com/1176713", }, { category: "self", summary: "SUSE Bug 1176721", url: "https://bugzilla.suse.com/1176721", }, { category: "self", summary: "SUSE Bug 1176722", url: "https://bugzilla.suse.com/1176722", }, { category: "self", summary: "SUSE Bug 1176725", url: "https://bugzilla.suse.com/1176725", }, { category: "self", summary: "SUSE Bug 1176732", url: "https://bugzilla.suse.com/1176732", }, { category: "self", summary: "SUSE Bug 1176763", url: "https://bugzilla.suse.com/1176763", }, { category: "self", summary: "SUSE Bug 1176775", url: "https://bugzilla.suse.com/1176775", }, { category: "self", summary: "SUSE Bug 1176788", url: "https://bugzilla.suse.com/1176788", }, { category: "self", summary: "SUSE Bug 1176789", url: "https://bugzilla.suse.com/1176789", }, { category: "self", summary: "SUSE Bug 1176833", url: "https://bugzilla.suse.com/1176833", }, { category: "self", summary: "SUSE Bug 1176855", url: "https://bugzilla.suse.com/1176855", }, { category: "self", summary: "SUSE Bug 1176869", url: "https://bugzilla.suse.com/1176869", }, { category: "self", summary: "SUSE Bug 1176877", url: "https://bugzilla.suse.com/1176877", }, { category: "self", summary: "SUSE Bug 1176907", url: "https://bugzilla.suse.com/1176907", }, { category: "self", summary: "SUSE Bug 1176925", url: "https://bugzilla.suse.com/1176925", }, { category: "self", summary: "SUSE Bug 1176942", url: "https://bugzilla.suse.com/1176942", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1176962", url: "https://bugzilla.suse.com/1176962", }, { category: "self", summary: "SUSE Bug 1176979", url: "https://bugzilla.suse.com/1176979", }, { category: "self", summary: "SUSE Bug 1176980", url: "https://bugzilla.suse.com/1176980", }, { category: "self", summary: "SUSE Bug 1176983", url: "https://bugzilla.suse.com/1176983", }, { category: "self", summary: "SUSE Bug 1176990", url: "https://bugzilla.suse.com/1176990", }, { category: "self", summary: "SUSE Bug 1177021", url: "https://bugzilla.suse.com/1177021", }, { category: "self", summary: "SUSE Bug 1177030", url: "https://bugzilla.suse.com/1177030", }, { category: "self", summary: "SUSE Bug 1177066", url: "https://bugzilla.suse.com/1177066", }, { category: "self", summary: "SUSE Bug 1177070", url: "https://bugzilla.suse.com/1177070", }, { category: "self", summary: "SUSE Bug 1177086", url: "https://bugzilla.suse.com/1177086", }, { category: "self", summary: "SUSE Bug 1177090", url: "https://bugzilla.suse.com/1177090", }, { category: "self", summary: "SUSE Bug 1177109", url: "https://bugzilla.suse.com/1177109", }, { category: "self", summary: "SUSE Bug 1177121", url: "https://bugzilla.suse.com/1177121", }, { category: "self", summary: "SUSE Bug 1177193", url: "https://bugzilla.suse.com/1177193", }, { category: "self", summary: "SUSE Bug 1177194", url: "https://bugzilla.suse.com/1177194", }, { category: "self", summary: "SUSE Bug 1177206", url: "https://bugzilla.suse.com/1177206", }, { category: "self", summary: "SUSE Bug 1177258", url: "https://bugzilla.suse.com/1177258", }, { category: "self", summary: "SUSE Bug 1177271", url: "https://bugzilla.suse.com/1177271", }, { category: "self", summary: "SUSE Bug 1177281", url: "https://bugzilla.suse.com/1177281", }, { category: "self", summary: "SUSE Bug 1177283", url: "https://bugzilla.suse.com/1177283", }, { category: "self", summary: "SUSE Bug 1177284", url: "https://bugzilla.suse.com/1177284", }, { category: "self", summary: "SUSE Bug 1177285", url: "https://bugzilla.suse.com/1177285", }, { category: "self", summary: "SUSE Bug 1177286", url: "https://bugzilla.suse.com/1177286", }, { category: "self", summary: "SUSE Bug 1177297", url: "https://bugzilla.suse.com/1177297", }, { category: "self", summary: "SUSE Bug 1177326", url: "https://bugzilla.suse.com/1177326", }, { category: "self", summary: "SUSE Bug 1177353", url: "https://bugzilla.suse.com/1177353", }, { category: "self", summary: "SUSE Bug 1177384", url: "https://bugzilla.suse.com/1177384", }, { category: "self", summary: "SUSE Bug 1177397", url: "https://bugzilla.suse.com/1177397", }, { category: "self", summary: "SUSE Bug 1177410", url: "https://bugzilla.suse.com/1177410", }, { category: "self", summary: "SUSE Bug 1177411", url: "https://bugzilla.suse.com/1177411", }, { category: "self", summary: "SUSE Bug 1177470", url: "https://bugzilla.suse.com/1177470", }, { category: "self", summary: "SUSE Bug 1177500", url: "https://bugzilla.suse.com/1177500", }, { category: "self", summary: "SUSE Bug 1177511", url: "https://bugzilla.suse.com/1177511", }, { category: "self", summary: "SUSE Bug 1177617", url: "https://bugzilla.suse.com/1177617", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1177679", url: "https://bugzilla.suse.com/1177679", }, { category: "self", summary: "SUSE Bug 1177681", url: "https://bugzilla.suse.com/1177681", }, { category: "self", summary: "SUSE Bug 1177683", url: "https://bugzilla.suse.com/1177683", }, { category: "self", summary: "SUSE Bug 1177687", url: "https://bugzilla.suse.com/1177687", }, { category: "self", summary: "SUSE Bug 1177694", url: "https://bugzilla.suse.com/1177694", }, { category: "self", summary: "SUSE Bug 1177697", url: "https://bugzilla.suse.com/1177697", }, { category: "self", summary: "SUSE Bug 1177698", url: "https://bugzilla.suse.com/1177698", }, { category: "self", summary: "SUSE Bug 1177703", url: "https://bugzilla.suse.com/1177703", }, { category: "self", summary: "SUSE Bug 1177719", url: "https://bugzilla.suse.com/1177719", }, { category: "self", summary: "SUSE Bug 1177724", url: "https://bugzilla.suse.com/1177724", }, { category: "self", summary: "SUSE Bug 1177725", url: "https://bugzilla.suse.com/1177725", }, { category: "self", summary: "SUSE Bug 1177726", url: "https://bugzilla.suse.com/1177726", }, { category: "self", summary: "SUSE Bug 1177733", url: "https://bugzilla.suse.com/1177733", }, { category: "self", summary: "SUSE Bug 1177739", url: "https://bugzilla.suse.com/1177739", }, { category: "self", summary: "SUSE Bug 1177749", url: "https://bugzilla.suse.com/1177749", }, { category: "self", summary: "SUSE Bug 1177750", url: "https://bugzilla.suse.com/1177750", }, { category: "self", summary: "SUSE Bug 1177754", url: "https://bugzilla.suse.com/1177754", }, { category: "self", summary: "SUSE Bug 1177755", url: "https://bugzilla.suse.com/1177755", }, { category: "self", summary: "SUSE Bug 1177765", url: "https://bugzilla.suse.com/1177765", }, { category: "self", summary: "SUSE Bug 1177766", url: "https://bugzilla.suse.com/1177766", }, { category: "self", summary: "SUSE Bug 1177799", url: "https://bugzilla.suse.com/1177799", }, { category: "self", summary: "SUSE Bug 1177801", url: "https://bugzilla.suse.com/1177801", }, { category: "self", summary: "SUSE Bug 1177814", url: "https://bugzilla.suse.com/1177814", }, { category: "self", summary: "SUSE Bug 1177817", url: "https://bugzilla.suse.com/1177817", }, { category: "self", summary: "SUSE Bug 1177820", url: "https://bugzilla.suse.com/1177820", }, { category: "self", summary: "SUSE Bug 1177854", url: "https://bugzilla.suse.com/1177854", }, { category: "self", summary: "SUSE Bug 1177855", url: "https://bugzilla.suse.com/1177855", }, { category: "self", summary: "SUSE Bug 1177856", url: "https://bugzilla.suse.com/1177856", }, { category: "self", summary: "SUSE Bug 1177861", url: "https://bugzilla.suse.com/1177861", }, { category: "self", summary: "SUSE Bug 1178002", url: "https://bugzilla.suse.com/1178002", }, { category: "self", summary: "SUSE Bug 1178049", url: "https://bugzilla.suse.com/1178049", }, { category: "self", summary: "SUSE Bug 1178079", url: "https://bugzilla.suse.com/1178079", }, { category: "self", summary: "SUSE Bug 1178123", url: "https://bugzilla.suse.com/1178123", }, { category: "self", summary: "SUSE Bug 1178166", url: "https://bugzilla.suse.com/1178166", }, { category: "self", summary: "SUSE Bug 1178173", url: "https://bugzilla.suse.com/1178173", }, { category: "self", summary: "SUSE Bug 1178175", url: "https://bugzilla.suse.com/1178175", }, { category: "self", summary: "SUSE Bug 1178176", url: "https://bugzilla.suse.com/1178176", }, { category: "self", summary: "SUSE Bug 1178177", url: "https://bugzilla.suse.com/1178177", }, { category: "self", summary: "SUSE Bug 1178182", url: "https://bugzilla.suse.com/1178182", }, { category: "self", summary: "SUSE Bug 1178183", url: "https://bugzilla.suse.com/1178183", }, { category: "self", summary: "SUSE Bug 1178184", url: "https://bugzilla.suse.com/1178184", }, { category: "self", summary: "SUSE Bug 1178185", url: "https://bugzilla.suse.com/1178185", }, { category: "self", summary: "SUSE Bug 1178186", url: "https://bugzilla.suse.com/1178186", }, { category: "self", summary: "SUSE Bug 1178190", url: "https://bugzilla.suse.com/1178190", }, { category: "self", summary: "SUSE Bug 1178191", url: "https://bugzilla.suse.com/1178191", }, { category: "self", summary: "SUSE Bug 1178203", url: "https://bugzilla.suse.com/1178203", }, { category: "self", summary: "SUSE Bug 1178227", url: "https://bugzilla.suse.com/1178227", }, { category: "self", summary: "SUSE Bug 1178246", url: "https://bugzilla.suse.com/1178246", }, { category: "self", summary: "SUSE Bug 1178255", url: "https://bugzilla.suse.com/1178255", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178286", url: "https://bugzilla.suse.com/1178286", }, { category: "self", summary: "SUSE Bug 1178307", url: "https://bugzilla.suse.com/1178307", }, { category: "self", summary: "SUSE Bug 1178330", url: "https://bugzilla.suse.com/1178330", }, { category: "self", summary: "SUSE Bug 1178393", url: "https://bugzilla.suse.com/1178393", }, { category: "self", summary: "SUSE Bug 1178395", url: "https://bugzilla.suse.com/1178395", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178426", url: "https://bugzilla.suse.com/1178426", }, { category: "self", summary: "SUSE Bug 1178461", url: "https://bugzilla.suse.com/1178461", }, { category: "self", summary: "SUSE Bug 1178579", url: "https://bugzilla.suse.com/1178579", }, { category: "self", summary: "SUSE Bug 1178581", url: "https://bugzilla.suse.com/1178581", }, { category: "self", summary: "SUSE Bug 1178584", url: "https://bugzilla.suse.com/1178584", }, { category: "self", summary: "SUSE Bug 1178585", url: "https://bugzilla.suse.com/1178585", }, { category: "self", summary: "SUSE Bug 1178589", url: "https://bugzilla.suse.com/1178589", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178612", url: "https://bugzilla.suse.com/1178612", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178635", url: "https://bugzilla.suse.com/1178635", }, { category: "self", summary: "SUSE Bug 1178653", url: "https://bugzilla.suse.com/1178653", }, { category: "self", summary: "SUSE Bug 1178659", url: "https://bugzilla.suse.com/1178659", }, { category: "self", summary: "SUSE Bug 1178660", url: "https://bugzilla.suse.com/1178660", }, { category: "self", summary: "SUSE Bug 1178661", url: "https://bugzilla.suse.com/1178661", }, { category: "self", summary: "SUSE Bug 1178669", url: "https://bugzilla.suse.com/1178669", }, { category: "self", summary: "SUSE Bug 1178686", url: "https://bugzilla.suse.com/1178686", }, { category: "self", summary: "SUSE Bug 1178740", url: "https://bugzilla.suse.com/1178740", }, { category: "self", summary: "SUSE Bug 1178755", url: "https://bugzilla.suse.com/1178755", }, { category: "self", summary: "SUSE Bug 1178756", url: "https://bugzilla.suse.com/1178756", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1178780", url: "https://bugzilla.suse.com/1178780", }, { category: "self", summary: "SUSE Bug 1178838", url: "https://bugzilla.suse.com/1178838", }, { category: "self", summary: "SUSE Bug 1178853", url: "https://bugzilla.suse.com/1178853", }, { category: "self", summary: "SUSE Bug 1178886", url: "https://bugzilla.suse.com/1178886", }, { category: "self", summary: "SUSE Bug 1179001", url: "https://bugzilla.suse.com/1179001", }, { category: "self", summary: "SUSE Bug 1179012", url: "https://bugzilla.suse.com/1179012", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179076", url: "https://bugzilla.suse.com/1179076", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179140", url: "https://bugzilla.suse.com/1179140", }, { category: "self", summary: "SUSE Bug 1179141", url: "https://bugzilla.suse.com/1179141", }, { category: "self", summary: "SUSE Bug 1179160", url: "https://bugzilla.suse.com/1179160", }, { category: "self", summary: "SUSE Bug 1179201", url: "https://bugzilla.suse.com/1179201", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179211", url: "https://bugzilla.suse.com/1179211", }, { category: "self", summary: "SUSE Bug 1179217", url: "https://bugzilla.suse.com/1179217", }, { category: "self", summary: "SUSE Bug 1179419", url: "https://bugzilla.suse.com/1179419", }, { category: "self", summary: "SUSE Bug 1179424", url: "https://bugzilla.suse.com/1179424", }, { category: "self", summary: "SUSE Bug 1179425", url: "https://bugzilla.suse.com/1179425", }, { category: "self", summary: "SUSE Bug 1179426", url: "https://bugzilla.suse.com/1179426", }, { category: "self", summary: "SUSE Bug 1179427", url: "https://bugzilla.suse.com/1179427", }, { category: "self", summary: "SUSE Bug 1179429", url: "https://bugzilla.suse.com/1179429", }, { category: "self", summary: "SUSE Bug 1179432", url: "https://bugzilla.suse.com/1179432", }, { category: "self", summary: "SUSE Bug 1179434", url: "https://bugzilla.suse.com/1179434", }, { category: "self", summary: "SUSE Bug 1179435", url: "https://bugzilla.suse.com/1179435", }, { category: "self", summary: "SUSE Bug 1179442", url: "https://bugzilla.suse.com/1179442", }, { category: "self", summary: "SUSE Bug 1179519", url: "https://bugzilla.suse.com/1179519", }, { category: "self", summary: "SUSE Bug 1179550", url: "https://bugzilla.suse.com/1179550", }, { category: "self", summary: "SUSE Bug 1179575", url: "https://bugzilla.suse.com/1179575", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179604", url: "https://bugzilla.suse.com/1179604", }, { category: "self", summary: "SUSE Bug 1179639", url: "https://bugzilla.suse.com/1179639", }, { category: "self", summary: "SUSE Bug 1179652", url: "https://bugzilla.suse.com/1179652", }, { category: "self", summary: "SUSE Bug 1179656", url: "https://bugzilla.suse.com/1179656", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179675", url: "https://bugzilla.suse.com/1179675", }, { category: "self", summary: "SUSE Bug 1179676", url: "https://bugzilla.suse.com/1179676", }, { category: "self", summary: "SUSE Bug 1179677", url: "https://bugzilla.suse.com/1179677", }, { category: "self", summary: "SUSE Bug 1179678", url: "https://bugzilla.suse.com/1179678", }, { category: "self", summary: "SUSE Bug 1179679", url: "https://bugzilla.suse.com/1179679", }, { category: "self", summary: "SUSE Bug 1179680", url: "https://bugzilla.suse.com/1179680", }, { category: "self", summary: "SUSE Bug 1179681", url: "https://bugzilla.suse.com/1179681", }, { category: "self", summary: "SUSE Bug 1179682", url: "https://bugzilla.suse.com/1179682", }, { category: "self", summary: "SUSE Bug 1179683", url: "https://bugzilla.suse.com/1179683", }, { category: "self", summary: "SUSE Bug 1179684", url: "https://bugzilla.suse.com/1179684", }, { category: "self", summary: "SUSE Bug 1179685", url: "https://bugzilla.suse.com/1179685", }, { category: "self", summary: "SUSE Bug 1179687", url: "https://bugzilla.suse.com/1179687", }, { category: "self", summary: "SUSE Bug 1179688", url: "https://bugzilla.suse.com/1179688", }, { category: "self", summary: "SUSE Bug 1179689", url: "https://bugzilla.suse.com/1179689", }, { category: "self", summary: "SUSE Bug 1179690", url: "https://bugzilla.suse.com/1179690", }, { category: "self", summary: "SUSE Bug 1179703", url: "https://bugzilla.suse.com/1179703", }, { category: "self", summary: "SUSE Bug 1179704", url: "https://bugzilla.suse.com/1179704", }, { category: "self", summary: "SUSE Bug 1179707", url: "https://bugzilla.suse.com/1179707", }, { category: "self", summary: "SUSE Bug 1179709", url: "https://bugzilla.suse.com/1179709", }, { category: "self", summary: "SUSE Bug 1179710", url: "https://bugzilla.suse.com/1179710", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179712", url: "https://bugzilla.suse.com/1179712", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179763", url: "https://bugzilla.suse.com/1179763", }, { category: "self", summary: "SUSE Bug 1179887", url: "https://bugzilla.suse.com/1179887", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179892", url: "https://bugzilla.suse.com/1179892", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180056", url: "https://bugzilla.suse.com/1180056", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180261", url: "https://bugzilla.suse.com/1180261", }, { category: "self", summary: "SUSE Bug 1180349", url: "https://bugzilla.suse.com/1180349", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE Bug 1180541", url: "https://bugzilla.suse.com/1180541", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180566", url: "https://bugzilla.suse.com/1180566", }, { category: "self", summary: "SUSE Bug 173030", url: "https://bugzilla.suse.com/173030", }, { category: "self", summary: "SUSE Bug 744692", url: "https://bugzilla.suse.com/744692", }, { category: "self", summary: "SUSE Bug 789311", url: "https://bugzilla.suse.com/789311", }, { category: "self", summary: "SUSE Bug 954532", url: "https://bugzilla.suse.com/954532", }, { category: "self", summary: "SUSE Bug 995541", url: "https://bugzilla.suse.com/995541", }, { category: "self", summary: "SUSE CVE CVE-2019-19462 page", url: "https://www.suse.com/security/cve/CVE-2019-19462/", }, { category: "self", summary: "SUSE CVE CVE-2019-20810 page", url: "https://www.suse.com/security/cve/CVE-2019-20810/", }, { category: "self", summary: "SUSE CVE CVE-2019-20812 page", url: "https://www.suse.com/security/cve/CVE-2019-20812/", }, { category: "self", summary: "SUSE CVE CVE-2020-0110 page", url: "https://www.suse.com/security/cve/CVE-2020-0110/", }, { category: "self", summary: "SUSE CVE CVE-2020-0305 page", url: "https://www.suse.com/security/cve/CVE-2020-0305/", }, { category: "self", summary: "SUSE CVE CVE-2020-0404 page", url: "https://www.suse.com/security/cve/CVE-2020-0404/", }, { category: "self", summary: "SUSE CVE CVE-2020-0427 page", url: "https://www.suse.com/security/cve/CVE-2020-0427/", }, { category: "self", summary: "SUSE CVE CVE-2020-0431 page", url: "https://www.suse.com/security/cve/CVE-2020-0431/", }, { category: "self", summary: "SUSE CVE CVE-2020-0432 page", url: "https://www.suse.com/security/cve/CVE-2020-0432/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-0543 page", url: "https://www.suse.com/security/cve/CVE-2020-0543/", }, { category: "self", summary: "SUSE CVE CVE-2020-10135 page", url: "https://www.suse.com/security/cve/CVE-2020-10135/", }, { category: "self", summary: "SUSE CVE CVE-2020-10711 page", url: "https://www.suse.com/security/cve/CVE-2020-10711/", }, { category: "self", summary: "SUSE CVE CVE-2020-10732 page", url: "https://www.suse.com/security/cve/CVE-2020-10732/", }, { category: "self", summary: "SUSE CVE CVE-2020-10751 page", url: "https://www.suse.com/security/cve/CVE-2020-10751/", }, { category: "self", summary: "SUSE CVE CVE-2020-10757 page", url: "https://www.suse.com/security/cve/CVE-2020-10757/", }, { category: "self", summary: "SUSE CVE CVE-2020-10766 page", url: "https://www.suse.com/security/cve/CVE-2020-10766/", }, { category: "self", summary: "SUSE CVE CVE-2020-10767 page", url: "https://www.suse.com/security/cve/CVE-2020-10767/", }, { category: "self", summary: "SUSE CVE CVE-2020-10768 page", url: "https://www.suse.com/security/cve/CVE-2020-10768/", }, { category: "self", summary: "SUSE CVE CVE-2020-10773 page", url: "https://www.suse.com/security/cve/CVE-2020-10773/", }, { category: "self", summary: "SUSE CVE CVE-2020-10781 page", url: "https://www.suse.com/security/cve/CVE-2020-10781/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-12351 page", url: "https://www.suse.com/security/cve/CVE-2020-12351/", }, { category: "self", summary: "SUSE CVE CVE-2020-12352 page", url: "https://www.suse.com/security/cve/CVE-2020-12352/", }, { category: "self", summary: "SUSE CVE CVE-2020-12652 page", url: "https://www.suse.com/security/cve/CVE-2020-12652/", }, { category: "self", summary: "SUSE CVE CVE-2020-12656 page", url: "https://www.suse.com/security/cve/CVE-2020-12656/", }, { category: "self", summary: "SUSE CVE CVE-2020-12769 page", url: "https://www.suse.com/security/cve/CVE-2020-12769/", }, { category: "self", summary: "SUSE CVE CVE-2020-12771 page", url: "https://www.suse.com/security/cve/CVE-2020-12771/", }, { category: "self", summary: "SUSE CVE CVE-2020-12888 page", url: "https://www.suse.com/security/cve/CVE-2020-12888/", }, { category: "self", summary: "SUSE CVE CVE-2020-13143 page", url: "https://www.suse.com/security/cve/CVE-2020-13143/", }, { category: "self", summary: "SUSE CVE CVE-2020-13974 page", url: "https://www.suse.com/security/cve/CVE-2020-13974/", }, { category: "self", summary: "SUSE CVE CVE-2020-14314 page", url: "https://www.suse.com/security/cve/CVE-2020-14314/", }, { category: "self", summary: "SUSE CVE CVE-2020-14331 page", url: "https://www.suse.com/security/cve/CVE-2020-14331/", }, { category: "self", summary: "SUSE CVE CVE-2020-14351 page", url: "https://www.suse.com/security/cve/CVE-2020-14351/", }, { category: "self", summary: "SUSE CVE CVE-2020-14356 page", url: "https://www.suse.com/security/cve/CVE-2020-14356/", }, { category: "self", summary: "SUSE CVE CVE-2020-14385 page", url: "https://www.suse.com/security/cve/CVE-2020-14385/", }, { category: "self", summary: "SUSE CVE CVE-2020-14386 page", url: "https://www.suse.com/security/cve/CVE-2020-14386/", }, { category: "self", summary: "SUSE CVE CVE-2020-14390 page", url: "https://www.suse.com/security/cve/CVE-2020-14390/", }, { category: "self", summary: "SUSE CVE CVE-2020-14416 page", url: "https://www.suse.com/security/cve/CVE-2020-14416/", }, { category: "self", summary: "SUSE CVE CVE-2020-15393 page", url: "https://www.suse.com/security/cve/CVE-2020-15393/", }, { category: "self", summary: "SUSE CVE CVE-2020-15436 page", url: "https://www.suse.com/security/cve/CVE-2020-15436/", }, { category: "self", summary: "SUSE CVE CVE-2020-15437 page", url: "https://www.suse.com/security/cve/CVE-2020-15437/", }, { category: "self", summary: "SUSE CVE CVE-2020-15780 page", url: "https://www.suse.com/security/cve/CVE-2020-15780/", }, { category: "self", summary: "SUSE CVE CVE-2020-16120 page", url: "https://www.suse.com/security/cve/CVE-2020-16120/", }, { category: "self", summary: "SUSE CVE CVE-2020-16166 page", url: "https://www.suse.com/security/cve/CVE-2020-16166/", }, { category: "self", summary: "SUSE CVE CVE-2020-1749 page", url: "https://www.suse.com/security/cve/CVE-2020-1749/", }, { category: "self", summary: "SUSE CVE CVE-2020-24490 page", url: "https://www.suse.com/security/cve/CVE-2020-24490/", }, { category: "self", summary: "SUSE CVE CVE-2020-25212 page", url: "https://www.suse.com/security/cve/CVE-2020-25212/", }, { category: "self", summary: "SUSE CVE CVE-2020-25284 page", url: "https://www.suse.com/security/cve/CVE-2020-25284/", }, { category: "self", summary: "SUSE CVE CVE-2020-25285 page", url: "https://www.suse.com/security/cve/CVE-2020-25285/", }, { category: "self", summary: "SUSE CVE CVE-2020-25641 page", url: "https://www.suse.com/security/cve/CVE-2020-25641/", }, { category: "self", summary: "SUSE CVE CVE-2020-25643 page", url: "https://www.suse.com/security/cve/CVE-2020-25643/", }, { category: "self", summary: "SUSE CVE CVE-2020-25645 page", url: "https://www.suse.com/security/cve/CVE-2020-25645/", }, { category: "self", summary: "SUSE CVE CVE-2020-25656 page", url: "https://www.suse.com/security/cve/CVE-2020-25656/", }, { category: "self", summary: "SUSE CVE CVE-2020-25668 page", url: "https://www.suse.com/security/cve/CVE-2020-25668/", }, { category: "self", summary: "SUSE CVE CVE-2020-25669 page", url: "https://www.suse.com/security/cve/CVE-2020-25669/", }, { category: "self", summary: "SUSE CVE CVE-2020-25704 page", url: "https://www.suse.com/security/cve/CVE-2020-25704/", }, { category: "self", summary: "SUSE CVE CVE-2020-25705 page", url: "https://www.suse.com/security/cve/CVE-2020-25705/", }, { category: "self", summary: "SUSE CVE CVE-2020-26088 page", url: "https://www.suse.com/security/cve/CVE-2020-26088/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-27830 page", url: "https://www.suse.com/security/cve/CVE-2020-27830/", }, { category: "self", summary: "SUSE CVE CVE-2020-28915 page", url: "https://www.suse.com/security/cve/CVE-2020-28915/", }, { category: "self", summary: "SUSE CVE CVE-2020-28941 page", url: "https://www.suse.com/security/cve/CVE-2020-28941/", }, { category: "self", summary: "SUSE CVE CVE-2020-28974 page", url: "https://www.suse.com/security/cve/CVE-2020-28974/", }, { category: "self", summary: "SUSE CVE CVE-2020-29369 page", url: "https://www.suse.com/security/cve/CVE-2020-29369/", }, { category: "self", summary: "SUSE CVE CVE-2020-29370 page", url: "https://www.suse.com/security/cve/CVE-2020-29370/", }, { category: "self", summary: "SUSE CVE CVE-2020-29371 page", url: "https://www.suse.com/security/cve/CVE-2020-29371/", }, { category: "self", summary: "SUSE CVE CVE-2020-29373 page", url: "https://www.suse.com/security/cve/CVE-2020-29373/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, { category: "self", summary: "SUSE CVE CVE-2020-8694 page", url: "https://www.suse.com/security/cve/CVE-2020-8694/", }, ], title: "Security update for RT kernel", tracking: { current_release_date: "2021-02-05T15:16:03Z", generator: { date: "2021-02-05T15:16:03Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:0242-1", initial_release_date: "2021-02-05T15:16:03Z", revision_history: [ { date: "2021-02-05T15:16:03Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", product: { name: "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", product_id: "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", }, }, { category: "product_version", name: "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", product: { name: "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", product_id: "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product: { name: "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product_id: "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product: { name: "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product_id: "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product: { name: "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product_id: "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product: { name: "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product_id: "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product: { name: "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product_id: "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product: { name: "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product_id: "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-5.3.18-lp152.3.5.1.x86_64", product: { name: "kernel-rt-5.3.18-lp152.3.5.1.x86_64", product_id: "kernel-rt-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", product: { name: "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", product_id: "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", product: { name: "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", product_id: "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", product: { name: "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", product_id: "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", product: { name: "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", product_id: "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", product: { name: "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", product_id: "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", product: { name: "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", product_id: "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product: { name: "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product_id: "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product: { name: "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product_id: "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product: { name: "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product_id: "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product: { name: "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product_id: "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product: { name: "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", product_id: "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, }, { category: "product_version", name: "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product: { name: "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", product_id: "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.2", product: { name: "openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.2", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", }, product_reference: "kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kernel-rt-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-source-rt-5.3.18-lp152.3.5.1.noarch as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", }, product_reference: "kernel-source-rt-5.3.18-lp152.3.5.1.noarch", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, { category: "default_component_of", full_product_name: { name: "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64 as component of openSUSE Leap 15.2", product_id: "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", }, product_reference: "reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.2", }, ], }, vulnerabilities: [ { cve: "CVE-2019-19462", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-19462", }, ], notes: [ { category: "general", text: "relay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-19462", url: "https://www.suse.com/security/cve/CVE-2019-19462", }, { category: "external", summary: "SUSE Bug 1158265 for CVE-2019-19462", url: "https://bugzilla.suse.com/1158265", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2019-19462", }, { cve: "CVE-2019-20810", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20810", }, ], notes: [ { category: "general", text: "go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20810", url: "https://www.suse.com/security/cve/CVE-2019-20810", }, { category: "external", summary: "SUSE Bug 1172458 for CVE-2019-20810", url: "https://bugzilla.suse.com/1172458", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2019-20810", }, { cve: "CVE-2019-20812", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20812", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20812", url: "https://www.suse.com/security/cve/CVE-2019-20812", }, { category: "external", summary: "SUSE Bug 1172453 for CVE-2019-20812", url: "https://bugzilla.suse.com/1172453", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2019-20812", }, { cve: "CVE-2020-0110", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0110", }, ], notes: [ { category: "general", text: "In psi_write of psi.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-148159562References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0110", url: "https://www.suse.com/security/cve/CVE-2020-0110", }, { category: "external", summary: "SUSE Bug 1171374 for CVE-2020-0110", url: "https://bugzilla.suse.com/1171374", }, { category: "external", summary: "SUSE Bug 1174874 for CVE-2020-0110", url: "https://bugzilla.suse.com/1174874", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-0110", }, { cve: "CVE-2020-0305", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0305", }, ], notes: [ { category: "general", text: "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0305", url: "https://www.suse.com/security/cve/CVE-2020-0305", }, { category: "external", summary: "SUSE Bug 1174462 for CVE-2020-0305", url: "https://bugzilla.suse.com/1174462", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-0305", }, { cve: "CVE-2020-0404", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0404", }, ], notes: [ { category: "general", text: "In uvc_scan_chain_forward of uvc_driver.c, there is a possible linked list corruption due to an unusual root cause. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111893654References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0404", url: "https://www.suse.com/security/cve/CVE-2020-0404", }, { category: "external", summary: "SUSE Bug 1176423 for CVE-2020-0404", url: "https://bugzilla.suse.com/1176423", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-0404", }, { cve: "CVE-2020-0427", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0427", }, ], notes: [ { category: "general", text: "In create_pinctrl of core.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-140550171", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0427", url: "https://www.suse.com/security/cve/CVE-2020-0427", }, { category: "external", summary: "SUSE Bug 1176725 for CVE-2020-0427", url: "https://bugzilla.suse.com/1176725", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-0427", }, { cve: "CVE-2020-0431", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0431", }, ], notes: [ { category: "general", text: "In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0431", url: "https://www.suse.com/security/cve/CVE-2020-0431", }, { category: "external", summary: "SUSE Bug 1176722 for CVE-2020-0431", url: "https://bugzilla.suse.com/1176722", }, { category: "external", summary: "SUSE Bug 1176896 for CVE-2020-0431", url: "https://bugzilla.suse.com/1176896", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-0431", }, { cve: "CVE-2020-0432", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0432", }, ], notes: [ { category: "general", text: "In skb_to_mamac of networking.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-143560807", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0432", url: "https://www.suse.com/security/cve/CVE-2020-0432", }, { category: "external", summary: "SUSE Bug 1176721 for CVE-2020-0432", url: "https://bugzilla.suse.com/1176721", }, { category: "external", summary: "SUSE Bug 1177165 for CVE-2020-0432", url: "https://bugzilla.suse.com/1177165", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-0432", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-0543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0543", }, ], notes: [ { category: "general", text: "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0543", url: "https://www.suse.com/security/cve/CVE-2020-0543", }, { category: "external", summary: "SUSE Bug 1154824 for CVE-2020-0543", url: "https://bugzilla.suse.com/1154824", }, { category: "external", summary: "SUSE Bug 1172205 for CVE-2020-0543", url: "https://bugzilla.suse.com/1172205", }, { category: "external", summary: "SUSE Bug 1172206 for CVE-2020-0543", url: "https://bugzilla.suse.com/1172206", }, { category: "external", summary: "SUSE Bug 1172207 for CVE-2020-0543", url: "https://bugzilla.suse.com/1172207", }, { category: "external", summary: "SUSE Bug 1172770 for CVE-2020-0543", url: "https://bugzilla.suse.com/1172770", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2020-0543", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2020-0543", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-0543", }, { cve: "CVE-2020-10135", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10135", }, ], notes: [ { category: "general", text: "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10135", url: "https://www.suse.com/security/cve/CVE-2020-10135", }, { category: "external", summary: "SUSE Bug 1171988 for CVE-2020-10135", url: "https://bugzilla.suse.com/1171988", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-10135", }, { cve: "CVE-2020-10711", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10711", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10711", url: "https://www.suse.com/security/cve/CVE-2020-10711", }, { category: "external", summary: "SUSE Bug 1171191 for CVE-2020-10711", url: "https://bugzilla.suse.com/1171191", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-10711", }, { cve: "CVE-2020-10732", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10732", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10732", url: "https://www.suse.com/security/cve/CVE-2020-10732", }, { category: "external", summary: "SUSE Bug 1171220 for CVE-2020-10732", url: "https://bugzilla.suse.com/1171220", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2020-10732", }, { cve: "CVE-2020-10751", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10751", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10751", url: "https://www.suse.com/security/cve/CVE-2020-10751", }, { category: "external", summary: "SUSE Bug 1171189 for CVE-2020-10751", url: "https://bugzilla.suse.com/1171189", }, { category: "external", summary: "SUSE Bug 1174963 for CVE-2020-10751", url: "https://bugzilla.suse.com/1174963", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-10751", }, { cve: "CVE-2020-10757", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10757", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10757", url: "https://www.suse.com/security/cve/CVE-2020-10757", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10757", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172317 for CVE-2020-10757", url: "https://bugzilla.suse.com/1172317", }, { category: "external", summary: "SUSE Bug 1172437 for CVE-2020-10757", url: "https://bugzilla.suse.com/1172437", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-10757", }, { cve: "CVE-2020-10766", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10766", }, ], notes: [ { category: "general", text: "A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10766", url: "https://www.suse.com/security/cve/CVE-2020-10766", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10766", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172781 for CVE-2020-10766", url: "https://bugzilla.suse.com/1172781", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-10766", }, { cve: "CVE-2020-10767", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10767", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10767", url: "https://www.suse.com/security/cve/CVE-2020-10767", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10767", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172782 for CVE-2020-10767", url: "https://bugzilla.suse.com/1172782", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-10767", }, { cve: "CVE-2020-10768", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10768", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10768", url: "https://www.suse.com/security/cve/CVE-2020-10768", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-10768", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1172783 for CVE-2020-10768", url: "https://bugzilla.suse.com/1172783", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-10768", }, { cve: "CVE-2020-10773", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10773", }, ], notes: [ { category: "general", text: "A stack information leak flaw was found in s390/s390x in the Linux kernel's memory manager functionality, where it incorrectly writes to the /proc/sys/vm/cmm_timeout file. This flaw allows a local user to see the kernel data.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10773", url: "https://www.suse.com/security/cve/CVE-2020-10773", }, { category: "external", summary: "SUSE Bug 1172999 for CVE-2020-10773", url: "https://bugzilla.suse.com/1172999", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.5, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2020-10773", }, { cve: "CVE-2020-10781", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-10781", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-10781", url: "https://www.suse.com/security/cve/CVE-2020-10781", }, { category: "external", summary: "SUSE Bug 1173074 for CVE-2020-10781", url: "https://bugzilla.suse.com/1173074", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-10781", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-12351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12351", }, ], notes: [ { category: "general", text: "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12351", url: "https://www.suse.com/security/cve/CVE-2020-12351", }, { category: "external", summary: "SUSE Bug 1177724 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177724", }, { category: "external", summary: "SUSE Bug 1177729 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177729", }, { category: "external", summary: "SUSE Bug 1178397 for CVE-2020-12351", url: "https://bugzilla.suse.com/1178397", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-12351", }, { cve: "CVE-2020-12352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12352", }, ], notes: [ { category: "general", text: "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12352", url: "https://www.suse.com/security/cve/CVE-2020-12352", }, { category: "external", summary: "SUSE Bug 1177725 for CVE-2020-12352", url: "https://bugzilla.suse.com/1177725", }, { category: "external", summary: "SUSE Bug 1178398 for CVE-2020-12352", url: "https://bugzilla.suse.com/1178398", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-12352", }, { cve: "CVE-2020-12652", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12652", }, ], notes: [ { category: "general", text: "The __mptctl_ioctl function in drivers/message/fusion/mptctl.c in the Linux kernel before 5.4.14 allows local users to hold an incorrect lock during the ioctl operation and trigger a race condition, i.e., a \"double fetch\" vulnerability, aka CID-28d76df18f0a. NOTE: the vendor states \"The security impact of this bug is not as bad as it could have been because these operations are all privileged and root already has enormous destructive power.\"", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12652", url: "https://www.suse.com/security/cve/CVE-2020-12652", }, { category: "external", summary: "SUSE Bug 1171218 for CVE-2020-12652", url: "https://bugzilla.suse.com/1171218", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-12652", }, { cve: "CVE-2020-12656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12656", }, ], notes: [ { category: "general", text: "** DISPUTED ** gss_mech_free in net/sunrpc/auth_gss/gss_mech_switch.c in the rpcsec_gss_krb5 implementation in the Linux kernel through 5.6.10 lacks certain domain_release calls, leading to a memory leak. Note: This was disputed with the assertion that the issue does not grant any access not already available. It is a problem that on unloading a specific kernel module some memory is leaked, but loading kernel modules is a privileged operation. A user could also write a kernel module to consume any amount of memory they like and load that replicating the effect of this bug.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12656", url: "https://www.suse.com/security/cve/CVE-2020-12656", }, { category: "external", summary: "SUSE Bug 1171219 for CVE-2020-12656", url: "https://bugzilla.suse.com/1171219", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.9, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2020-12656", }, { cve: "CVE-2020-12769", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12769", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.4.17. drivers/spi/spi-dw.c allows attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12769", url: "https://www.suse.com/security/cve/CVE-2020-12769", }, { category: "external", summary: "SUSE Bug 1171983 for CVE-2020-12769", url: "https://bugzilla.suse.com/1171983", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.3, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2020-12769", }, { cve: "CVE-2020-12771", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12771", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12771", url: "https://www.suse.com/security/cve/CVE-2020-12771", }, { category: "external", summary: "SUSE Bug 1171732 for CVE-2020-12771", url: "https://bugzilla.suse.com/1171732", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-12771", }, { cve: "CVE-2020-12888", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12888", }, ], notes: [ { category: "general", text: "The VFIO PCI driver in the Linux kernel through 5.6.13 mishandles attempts to access disabled memory space.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-12888", url: "https://www.suse.com/security/cve/CVE-2020-12888", }, { category: "external", summary: "SUSE Bug 1159281 for CVE-2020-12888", url: "https://bugzilla.suse.com/1159281", }, { category: "external", summary: "SUSE Bug 1171868 for CVE-2020-12888", url: "https://bugzilla.suse.com/1171868", }, { category: "external", summary: "SUSE Bug 1176979 for CVE-2020-12888", url: "https://bugzilla.suse.com/1176979", }, { category: "external", summary: "SUSE Bug 1179612 for CVE-2020-12888", url: "https://bugzilla.suse.com/1179612", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-12888", }, { cve: "CVE-2020-13143", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13143", }, ], notes: [ { category: "general", text: "gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c in the Linux kernel 3.16 through 5.6.13 relies on kstrdup without considering the possibility of an internal '\\0' value, which allows attackers to trigger an out-of-bounds read, aka CID-15753588bcd4.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13143", url: "https://www.suse.com/security/cve/CVE-2020-13143", }, { category: "external", summary: "SUSE Bug 1171982 for CVE-2020-13143", url: "https://bugzilla.suse.com/1171982", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2020-13143", }, { cve: "CVE-2020-13974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-13974", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel 4.4 through 5.7.1. drivers/tty/vt/keyboard.c has an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. NOTE: Members in the community argue that the integer overflow does not lead to a security issue in this case.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-13974", url: "https://www.suse.com/security/cve/CVE-2020-13974", }, { category: "external", summary: "SUSE Bug 1172775 for CVE-2020-13974", url: "https://bugzilla.suse.com/1172775", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-13974", }, { cve: "CVE-2020-14314", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14314", }, ], notes: [ { category: "general", text: "A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14314", url: "https://www.suse.com/security/cve/CVE-2020-14314", }, { category: "external", summary: "SUSE Bug 1173798 for CVE-2020-14314", url: "https://bugzilla.suse.com/1173798", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 2.8, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2020-14314", }, { cve: "CVE-2020-14331", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14331", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14331", url: "https://www.suse.com/security/cve/CVE-2020-14331", }, { category: "external", summary: "SUSE Bug 1174205 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174205", }, { category: "external", summary: "SUSE Bug 1174247 for CVE-2020-14331", url: "https://bugzilla.suse.com/1174247", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-14331", }, { cve: "CVE-2020-14351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14351", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14351", url: "https://www.suse.com/security/cve/CVE-2020-14351", }, { category: "external", summary: "SUSE Bug 1177086 for CVE-2020-14351", url: "https://bugzilla.suse.com/1177086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-14351", }, { cve: "CVE-2020-14356", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14356", }, ], notes: [ { category: "general", text: "A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14356", url: "https://www.suse.com/security/cve/CVE-2020-14356", }, { category: "external", summary: "SUSE Bug 1175213 for CVE-2020-14356", url: "https://bugzilla.suse.com/1175213", }, { category: "external", summary: "SUSE Bug 1176392 for CVE-2020-14356", url: "https://bugzilla.suse.com/1176392", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-14356", }, { cve: "CVE-2020-14385", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14385", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.9-rc4. A failure of the file system metadata validator in XFS can cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt. This can lead to the filesystem being shutdown, or otherwise rendered inaccessible until it is remounted, leading to a denial of service. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14385", url: "https://www.suse.com/security/cve/CVE-2020-14385", }, { category: "external", summary: "SUSE Bug 1176137 for CVE-2020-14385", url: "https://bugzilla.suse.com/1176137", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-14385", }, { cve: "CVE-2020-14386", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14386", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14386", url: "https://www.suse.com/security/cve/CVE-2020-14386", }, { category: "external", summary: "SUSE Bug 1176069 for CVE-2020-14386", url: "https://bugzilla.suse.com/1176069", }, { category: "external", summary: "SUSE Bug 1176072 for CVE-2020-14386", url: "https://bugzilla.suse.com/1176072", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-14386", }, { cve: "CVE-2020-14390", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14390", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel in versions before 5.9-rc6. When changing screen size, an out-of-bounds memory write can occur leading to memory corruption or a denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14390", url: "https://www.suse.com/security/cve/CVE-2020-14390", }, { category: "external", summary: "SUSE Bug 1176235 for CVE-2020-14390", url: "https://bugzilla.suse.com/1176235", }, { category: "external", summary: "SUSE Bug 1176253 for CVE-2020-14390", url: "https://bugzilla.suse.com/1176253", }, { category: "external", summary: "SUSE Bug 1176278 for CVE-2020-14390", url: "https://bugzilla.suse.com/1176278", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-14390", }, { cve: "CVE-2020-14416", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-14416", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.4.16, a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-14416", url: "https://www.suse.com/security/cve/CVE-2020-14416", }, { category: "external", summary: "SUSE Bug 1162002 for CVE-2020-14416", url: "https://bugzilla.suse.com/1162002", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-14416", }, { cve: "CVE-2020-15393", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15393", }, ], notes: [ { category: "general", text: "In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15393", url: "https://www.suse.com/security/cve/CVE-2020-15393", }, { category: "external", summary: "SUSE Bug 1173514 for CVE-2020-15393", url: "https://bugzilla.suse.com/1173514", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-15393", }, { cve: "CVE-2020-15436", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15436", }, ], notes: [ { category: "general", text: "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15436", url: "https://www.suse.com/security/cve/CVE-2020-15436", }, { category: "external", summary: "SUSE Bug 1179141 for CVE-2020-15436", url: "https://bugzilla.suse.com/1179141", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-15436", }, { cve: "CVE-2020-15437", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15437", }, ], notes: [ { category: "general", text: "The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15437", url: "https://www.suse.com/security/cve/CVE-2020-15437", }, { category: "external", summary: "SUSE Bug 1179140 for CVE-2020-15437", url: "https://bugzilla.suse.com/1179140", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-15437", }, { cve: "CVE-2020-15780", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-15780", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-15780", url: "https://www.suse.com/security/cve/CVE-2020-15780", }, { category: "external", summary: "SUSE Bug 1173573 for CVE-2020-15780", url: "https://bugzilla.suse.com/1173573", }, { category: "external", summary: "SUSE Bug 1174186 for CVE-2020-15780", url: "https://bugzilla.suse.com/1174186", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-15780", }, { cve: "CVE-2020-16120", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16120", }, ], notes: [ { category: "general", text: "Overlayfs did not properly perform permission checking when copying up files in an overlayfs and could be exploited from within a user namespace, if, for example, unprivileged user namespaces were allowed. It was possible to have a file not readable by an unprivileged user to be copied to a mountpoint controlled by the user, like a removable device. This was introduced in kernel version 4.19 by commit d1d04ef (\"ovl: stack file ops\"). This was fixed in kernel version 5.8 by commits 56230d9 (\"ovl: verify permissions in ovl_path_open()\"), 48bd024 (\"ovl: switch to mounter creds in readdir\") and 05acefb (\"ovl: check permission to open real file\"). Additionally, commits 130fdbc (\"ovl: pass correct flags for opening real directory\") and 292f902 (\"ovl: call secutiry hook in ovl_real_ioctl()\") in kernel 5.8 might also be desired or necessary. These additional commits introduced a regression in overlay mounts within user namespaces which prevented access to files with ownership outside of the user namespace. This regression was mitigated by subsequent commit b6650da (\"ovl: do not fail because of O_NOATIMEi\") in kernel 5.11.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16120", url: "https://www.suse.com/security/cve/CVE-2020-16120", }, { category: "external", summary: "SUSE Bug 1177470 for CVE-2020-16120", url: "https://bugzilla.suse.com/1177470", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-16120", }, { cve: "CVE-2020-16166", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-16166", }, ], notes: [ { category: "general", text: "The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-16166", url: "https://www.suse.com/security/cve/CVE-2020-16166", }, { category: "external", summary: "SUSE Bug 1174757 for CVE-2020-16166", url: "https://bugzilla.suse.com/1174757", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-16166", }, { cve: "CVE-2020-1749", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-1749", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-1749", url: "https://www.suse.com/security/cve/CVE-2020-1749", }, { category: "external", summary: "SUSE Bug 1165629 for CVE-2020-1749", url: "https://bugzilla.suse.com/1165629", }, { category: "external", summary: "SUSE Bug 1165631 for CVE-2020-1749", url: "https://bugzilla.suse.com/1165631", }, { category: "external", summary: "SUSE Bug 1177511 for CVE-2020-1749", url: "https://bugzilla.suse.com/1177511", }, { category: "external", summary: "SUSE Bug 1177513 for CVE-2020-1749", url: "https://bugzilla.suse.com/1177513", }, { category: "external", summary: "SUSE Bug 1189302 for CVE-2020-1749", url: "https://bugzilla.suse.com/1189302", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-1749", }, { cve: "CVE-2020-24490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24490", }, ], notes: [ { category: "general", text: "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-24490", url: "https://www.suse.com/security/cve/CVE-2020-24490", }, { category: "external", summary: "SUSE Bug 1177726 for CVE-2020-24490", url: "https://bugzilla.suse.com/1177726", }, { category: "external", summary: "SUSE Bug 1177727 for CVE-2020-24490", url: "https://bugzilla.suse.com/1177727", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-24490", }, { cve: "CVE-2020-25212", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25212", }, ], notes: [ { category: "general", text: "A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25212", url: "https://www.suse.com/security/cve/CVE-2020-25212", }, { category: "external", summary: "SUSE Bug 1176381 for CVE-2020-25212", url: "https://bugzilla.suse.com/1176381", }, { category: "external", summary: "SUSE Bug 1176382 for CVE-2020-25212", url: "https://bugzilla.suse.com/1176382", }, { category: "external", summary: "SUSE Bug 1177027 for CVE-2020-25212", url: "https://bugzilla.suse.com/1177027", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-25212", }, { cve: "CVE-2020-25284", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25284", }, ], notes: [ { category: "general", text: "The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25284", url: "https://www.suse.com/security/cve/CVE-2020-25284", }, { category: "external", summary: "SUSE Bug 1176482 for CVE-2020-25284", url: "https://bugzilla.suse.com/1176482", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-25284", }, { cve: "CVE-2020-25285", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25285", }, ], notes: [ { category: "general", text: "A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25285", url: "https://www.suse.com/security/cve/CVE-2020-25285", }, { category: "external", summary: "SUSE Bug 1176485 for CVE-2020-25285", url: "https://bugzilla.suse.com/1176485", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-25285", }, { cve: "CVE-2020-25641", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25641", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop, causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device, resulting in a denial of service. The highest threat from this vulnerability is to system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25641", url: "https://www.suse.com/security/cve/CVE-2020-25641", }, { category: "external", summary: "SUSE Bug 1177121 for CVE-2020-25641", url: "https://bugzilla.suse.com/1177121", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-25641", }, { cve: "CVE-2020-25643", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25643", }, ], notes: [ { category: "general", text: "A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25643", url: "https://www.suse.com/security/cve/CVE-2020-25643", }, { category: "external", summary: "SUSE Bug 1177206 for CVE-2020-25643", url: "https://bugzilla.suse.com/1177206", }, { category: "external", summary: "SUSE Bug 1177226 for CVE-2020-25643", url: "https://bugzilla.suse.com/1177226", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-25643", }, { cve: "CVE-2020-25645", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25645", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25645", url: "https://www.suse.com/security/cve/CVE-2020-25645", }, { category: "external", summary: "SUSE Bug 1177511 for CVE-2020-25645", url: "https://bugzilla.suse.com/1177511", }, { category: "external", summary: "SUSE Bug 1177513 for CVE-2020-25645", url: "https://bugzilla.suse.com/1177513", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-25645", }, { cve: "CVE-2020-25656", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25656", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25656", url: "https://www.suse.com/security/cve/CVE-2020-25656", }, { category: "external", summary: "SUSE Bug 1177766 for CVE-2020-25656", url: "https://bugzilla.suse.com/1177766", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-25656", }, { cve: "CVE-2020-25668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25668", }, ], notes: [ { category: "general", text: "A flaw was found in Linux Kernel because access to the global variable fg_console is not properly synchronized leading to a use after free in con_font_op.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25668", url: "https://www.suse.com/security/cve/CVE-2020-25668", }, { category: "external", summary: "SUSE Bug 1178123 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178123", }, { category: "external", summary: "SUSE Bug 1178622 for CVE-2020-25668", url: "https://bugzilla.suse.com/1178622", }, { category: "external", summary: "SUSE Bug 1196914 for CVE-2020-25668", url: "https://bugzilla.suse.com/1196914", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-25668", }, { cve: "CVE-2020-25669", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25669", }, ], notes: [ { category: "general", text: "A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25669", url: "https://www.suse.com/security/cve/CVE-2020-25669", }, { category: "external", summary: "SUSE Bug 1178182 for CVE-2020-25669", url: "https://bugzilla.suse.com/1178182", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-25669", }, { cve: "CVE-2020-25704", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25704", }, ], notes: [ { category: "general", text: "A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25704", url: "https://www.suse.com/security/cve/CVE-2020-25704", }, { category: "external", summary: "SUSE Bug 1178393 for CVE-2020-25704", url: "https://bugzilla.suse.com/1178393", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-25704", }, { cve: "CVE-2020-25705", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25705", }, ], notes: [ { category: "general", text: "A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25705", url: "https://www.suse.com/security/cve/CVE-2020-25705", }, { category: "external", summary: "SUSE Bug 1175721 for CVE-2020-25705", url: "https://bugzilla.suse.com/1175721", }, { category: "external", summary: "SUSE Bug 1178782 for CVE-2020-25705", url: "https://bugzilla.suse.com/1178782", }, { category: "external", summary: "SUSE Bug 1178783 for CVE-2020-25705", url: "https://bugzilla.suse.com/1178783", }, { category: "external", summary: "SUSE Bug 1191790 for CVE-2020-25705", url: "https://bugzilla.suse.com/1191790", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-25705", }, { cve: "CVE-2020-26088", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-26088", }, ], notes: [ { category: "general", text: "A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-26088", url: "https://www.suse.com/security/cve/CVE-2020-26088", }, { category: "external", summary: "SUSE Bug 1176990 for CVE-2020-26088", url: "https://bugzilla.suse.com/1176990", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-26088", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-27830", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27830", }, ], notes: [ { category: "general", text: "A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27830", url: "https://www.suse.com/security/cve/CVE-2020-27830", }, { category: "external", summary: "SUSE Bug 1179656 for CVE-2020-27830", url: "https://bugzilla.suse.com/1179656", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-27830", }, { cve: "CVE-2020-28915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28915", }, ], notes: [ { category: "general", text: "A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28915", url: "https://www.suse.com/security/cve/CVE-2020-28915", }, { category: "external", summary: "SUSE Bug 1178886 for CVE-2020-28915", url: "https://bugzilla.suse.com/1178886", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-28915", }, { cve: "CVE-2020-28941", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28941", }, ], notes: [ { category: "general", text: "An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28941", url: "https://www.suse.com/security/cve/CVE-2020-28941", }, { category: "external", summary: "SUSE Bug 1178740 for CVE-2020-28941", url: "https://bugzilla.suse.com/1178740", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.2, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-28941", }, { cve: "CVE-2020-28974", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28974", }, ], notes: [ { category: "general", text: "A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28974", url: "https://www.suse.com/security/cve/CVE-2020-28974", }, { category: "external", summary: "SUSE Bug 1178589 for CVE-2020-28974", url: "https://bugzilla.suse.com/1178589", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-28974", }, { cve: "CVE-2020-29369", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29369", }, ], notes: [ { category: "general", text: "An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29369", url: "https://www.suse.com/security/cve/CVE-2020-29369", }, { category: "external", summary: "SUSE Bug 1173504 for CVE-2020-29369", url: "https://bugzilla.suse.com/1173504", }, { category: "external", summary: "SUSE Bug 1179432 for CVE-2020-29369", url: "https://bugzilla.suse.com/1179432", }, { category: "external", summary: "SUSE Bug 1179646 for CVE-2020-29369", url: "https://bugzilla.suse.com/1179646", }, { category: "external", summary: "SUSE Bug 1182109 for CVE-2020-29369", url: "https://bugzilla.suse.com/1182109", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-29369", }, { cve: "CVE-2020-29370", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29370", }, ], notes: [ { category: "general", text: "An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29370", url: "https://www.suse.com/security/cve/CVE-2020-29370", }, { category: "external", summary: "SUSE Bug 1179435 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179435", }, { category: "external", summary: "SUSE Bug 1179648 for CVE-2020-29370", url: "https://bugzilla.suse.com/1179648", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-29370", }, { cve: "CVE-2020-29371", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29371", }, ], notes: [ { category: "general", text: "An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29371", url: "https://www.suse.com/security/cve/CVE-2020-29371", }, { category: "external", summary: "SUSE Bug 1179429 for CVE-2020-29371", url: "https://bugzilla.suse.com/1179429", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "low", }, ], title: "CVE-2020-29371", }, { cve: "CVE-2020-29373", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29373", }, ], notes: [ { category: "general", text: "An issue was discovered in fs/io_uring.c in the Linux kernel before 5.6. It unsafely handles the root directory during path lookups, and thus a process inside a mount namespace can escape to unintended filesystem locations, aka CID-ff002b30181d.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29373", url: "https://www.suse.com/security/cve/CVE-2020-29373", }, { category: "external", summary: "SUSE Bug 1179434 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179434", }, { category: "external", summary: "SUSE Bug 1179779 for CVE-2020-29373", url: "https://bugzilla.suse.com/1179779", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-29373", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-4788", }, { cve: "CVE-2020-8694", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-8694", }, ], notes: [ { category: "general", text: "Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-8694", url: "https://www.suse.com/security/cve/CVE-2020-8694", }, { category: "external", summary: "SUSE Bug 1170415 for CVE-2020-8694", url: "https://bugzilla.suse.com/1170415", }, { category: "external", summary: "SUSE Bug 1170446 for CVE-2020-8694", url: "https://bugzilla.suse.com/1170446", }, { category: "external", summary: "SUSE Bug 1178591 for CVE-2020-8694", url: "https://bugzilla.suse.com/1178591", }, { category: "external", summary: "SUSE Bug 1178700 for CVE-2020-8694", url: "https://bugzilla.suse.com/1178700", }, { category: "external", summary: "SUSE Bug 1179661 for CVE-2020-8694", url: "https://bugzilla.suse.com/1179661", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.2:cluster-md-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:cluster-md-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:dlm-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:gfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-devel-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-devel-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-rt_debug-extra-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kernel-source-rt-5.3.18-lp152.3.5.1.noarch", "openSUSE Leap 15.2:kernel-syms-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:kselftests-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:ocfs2-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt-5.3.18-lp152.3.5.1.x86_64", "openSUSE Leap 15.2:reiserfs-kmp-rt_debug-5.3.18-lp152.3.5.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-02-05T15:16:03Z", details: "moderate", }, ], title: "CVE-2020-8694", }, ], }
opensuse-su-2021:0075-1
Vulnerability from csaf_opensuse
Published
2021-01-16 10:06
Modified
2021-01-16 10:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2020-29568: An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable (bnc#1179508).
- CVE-2020-29569: The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback (bnc#1179509).
- CVE-2020-25639: Bail out of nouveau_channel_new if channel init fails (bsc#1176846).
- CVE-2020-28374: In drivers/target/target_core_xcopy.c insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore (bnc#1178372 1180676).
- CVE-2020-36158: mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332 (bnc#1180559).
- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).
- CVE-2020-0466: In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180031).
- CVE-2020-27068: In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation (bnc#1180086).
- CVE-2020-0465: In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180029).
- CVE-2020-0444: In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180027).
- CVE-2020-29660: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may have allowed a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24 (bnc#1179745).
- CVE-2020-29661: A locking issue was discovered in the tty subsystem of the Linux kernel drivers/tty/tty_jobctrl.c allowed a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b (bnc#1179745).
- CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel (bnc#1179107).
- CVE-2020-11668: In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandled invalid descriptors, aka CID-a246b4d54770 (bnc#1168952).
- CVE-2019-20934: An issue was discovered in the Linux kernel On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c (bnc#1179663).
- CVE-2020-27786: A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation (bnc#1179601).
- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666).
The following non-security bugs were fixed:
- ACPI: PNP: compare the string length in the matching_id() (git-fixes).
- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).
- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).
- ALSA: ca0106: fix error code handling (git-fixes).
- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).
- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).
- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).
- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).
- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).
- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).
- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).
- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).
- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).
- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).
- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).
- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).
- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).
- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).
- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).
- ALSA: hda: Fix potential race in unsol event handler (git-fixes).
- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).
- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).
- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).
- ALSA: line6: Perform sanity check for each URB creation (git-fixes).
- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).
- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).
- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).
- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).
- ALSA: timer: Limit max amount of slave instances (git-fixes).
- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).
- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).
- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).
- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).
- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).
- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).
- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).
- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).
- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).
- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).
- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).
- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).
- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).
- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).
- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).
- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).
- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).
- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).
- ASoC: pcm: DRAIN support reactivation (git-fixes).
- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).
- ASoC: sti: fix possible sleep-in-atomic (git-fixes).
- ASoC: wm8904: fix regcache handling (git-fixes).
- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).
- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).
- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).
- Avoid a GCC warning about '/*' within a comment.
- Bluetooth: Fix advertising duplicated flags (git-fixes).
- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).
- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).
- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).
- Drop a backported uvcvideo patch that caused a regression (bsc#1180117) Also blacklisting the commit
- EDAC/amd64: Fix PCI component registration (bsc#1112178).
- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).
- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).
- HID: Improve Windows Precision Touchpad detection (git-fixes).
- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).
- HID: core: Correctly handle ReportSize being zero (git-fixes).
- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).
- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).
- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).
- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).
- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).
- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).
- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).
- Input: ads7846 - fix race that causes missing releases (git-fixes).
- Input: ads7846 - fix unaligned access on 7845 (git-fixes).
- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).
- Input: cm109 - do not stomp on control URB (git-fixes).
- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).
- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).
- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).
- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).
- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).
- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).
- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).
- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).
- Input: omap4-keypad - fix runtime PM error handling (git-fixes).
- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).
- Input: trackpoint - add new trackpoint variant IDs (git-fixes).
- Input: trackpoint - enable Synaptics trackpoints (git-fixes).
- Input: xpad - support Ardwiino Controllers (git-fixes).
- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).
- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).
- NFS: fix nfs_path in case of a rename retry (git-fixes).
- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).
- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).
- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).
- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).
- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).
- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).
- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).
- PM: ACPI: Output correct message on target power state (git-fixes).
- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).
- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).
- Revert 'ACPI / resources: Use AE_CTRL_TERMINATE to terminate resources walks' (git-fixes).
- Revert 'ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO' (git-fixes).
- Revert 'PM / devfreq: Modify the device name as devfreq(X) for sysfs' (git-fixes).
- Revert 'device property: Keep secondary firmware node secondary by type' (git-fixes).
- Revert 'platform/x86: wmi: Destroy on cleanup rather than unregister' (git-fixes).
- Revert 'powerpc/pseries/hotplug-cpu: Remove double free in error path' (bsc#1065729).
- Revert 'serial: amba-pl011: Make sure we initialize the port.lock spinlock' (git-fixes).
- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).
- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).
- SMB3: Honor lease disabling for multiuser mounts (git-fixes).
- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).
- SUNRPC: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).
- USB: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).
- USB: Skip endpoints with 0 maxpacket length (git-fixes).
- USB: UAS: introduce a quirk to set no_write_same (git-fixes).
- USB: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).
- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).
- USB: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).
- USB: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).
- USB: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).
- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).
- USB: ldusb: use unsigned size format specifiers (git-fixes).
- USB: serial: ch341: add new Product ID for CH341A (git-fixes).
- USB: serial: ch341: sort device-id entries (git-fixes).
- USB: serial: digi_acceleport: clean up modem-control handling (git-fixes).
- USB: serial: digi_acceleport: clean up set_termios (git-fixes).
- USB: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).
- USB: serial: digi_acceleport: remove in_interrupt() usage.
- USB: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).
- USB: serial: digi_acceleport: rename tty flag variable (git-fixes).
- USB: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).
- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).
- USB: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).
- USB: serial: keyspan_pda: fix stalled writes (git-fixes).
- USB: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).
- USB: serial: keyspan_pda: fix write deadlock (git-fixes).
- USB: serial: keyspan_pda: fix write unthrottling (git-fixes).
- USB: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).
- USB: serial: kl5kusb105: fix memleak on open (git-fixes).
- USB: serial: mos7720: fix parallel-port state restore (git-fixes).
- USB: serial: option: add Fibocom NL668 variants (git-fixes).
- USB: serial: option: add interface-number sanity check to flag handling (git-fixes).
- USB: serial: option: add support for Thales Cinterion EXS82 (git-fixes).
- USB: serial: option: fix Quectel BG96 matching (git-fixes).
- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).
- USB: yurex: fix control-URB timeout handling (git-fixes).
- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).
- ath10k: Fix an error handling path (git-fixes).
- ath10k: Release some resources in an error handling path (git-fixes).
- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).
- ath10k: fix backtrace on coredump (git-fixes).
- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).
- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).
- ath6kl: fix enum-conversion warning (git-fixes).
- ath9k_htc: Discard undersized packets (git-fixes).
- ath9k_htc: Modify byte order for an error message (git-fixes).
- ath9k_htc: Silence undersized packet warnings (git-fixes).
- ath9k_htc: Use appropriate rs_datalen type (git-fixes).
- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).
- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).
- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).
- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).
- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).
- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).
- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).
- can: mcp251x: add error check when wq alloc failed (git-fixes).
- can: softing: softing_netdev_open(): fix error handling (git-fixes).
- cfg80211: initialize rekey_data (git-fixes).
- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).
- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).
- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).
- cifs: fix check of tcon dfs in smb1 (bsc#1178270).
- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).
- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).
- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).
- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).
- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).
- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).
- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).
- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).
- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).
- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).
- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).
- clk: tegra: Fix duplicated SE clock entry (git-fixes).
- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).
- clk: ti: composite: fix memory leak (git-fixes).
- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).
- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).
- coredump: fix core_pattern parse error (git-fixes).
- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).
- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).
- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).
- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).
- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).
- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).
- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).
- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).
- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).
- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).
- docs: Fix reST markup when linking to sections (git-fixes).
- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).
- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).
- drm/amd/display: remove useless if/else (git-fixes).
- drm/amdgpu: fix build_coefficients() argument (git-fixes).
- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).
- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#1129770)
- drm/gma500: fix double free of gma_connector (git-fixes).
- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).
- drm/msm/dpu: Add newline to printks (git-fixes).
- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).
- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).
- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).
- epoll: Keep a reference on files added to the check list (bsc#1180031).
- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).
- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).
- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).
- ext4: fix error handling code in add_new_gdb (bsc#1179722).
- ext4: fix invalid inode checksum (bsc#1179723).
- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).
- ext4: limit entries returned when counting fsmap records (bsc#1179671).
- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).
- extcon: max77693: Fix modalias string (git-fixes).
- fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178)
- fbcon: Remove the superfluous break (bsc#1129770)
- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).
- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).
- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).
- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).
- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).
- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).
- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).
- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).
- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).
- gpio: max77620: Fixup debounce delays (git-fixes).
- gpio: max77620: Use correct unit for debounce times (git-fixes).
- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).
- gpio: mvebu: fix potential user-after-free on probe (git-fixes).
- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).
- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).
- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).
- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).
- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).
- gpiolib: fix up emulated open drain outputs (git-fixes).
- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).
- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).
- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).
- i2c: i801: Fix resume bug (git-fixes).
- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).
- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).
- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).
- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).
- ibmvnic: add some debugs (bsc#1179896 ltc#190255).
- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).
- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).
- ibmvnic: enhance resetting status check during module exit (bsc#1065729).
- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).
- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).
- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).
- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).
- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).
- iio: adc: max1027: Reset the device at probe time (git-fixes).
- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).
- iio: bmp280: fix compensation of humidity (git-fixes).
- iio: buffer: Fix demux update (git-fixes).
- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).
- iio: fix center temperature of bmc150-accel-core (git-fixes).
- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).
- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).
- iio: srf04: fix wrong limitation in distance measuring (git-fixes).
- iio:imu:bmi160: Fix too large a buffer (git-fixes).
- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).
- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).
- ipw2x00: Fix -Wcast-function-type (git-fixes).
- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).
- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).
- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).
- iwlwifi: pcie: limit memory read spin time (git-fixes).
- kABI fix for g2d (git-fixes).
- kABI workaround for HD-audio generic parser (git-fixes).
- kABI workaround for dsa/b53 changes (git-fixes).
- kABI workaround for net/ipvlan changes (git-fixes).
- kABI: ath10k: move a new structure member to the end (git-fixes).
- kABI: genirq: add back irq_create_mapping (bsc#1065729).
- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015).
- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)
- kgdb: Fix spurious true from in_dbg_master() (git-fixes).
- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).
- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).
- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).
- mac80211: fix authentication with iwlwifi/mvm (git-fixes).
- mac80211: fix use of skb payload instead of header (git-fixes).
- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).
- matroxfb: avoid -Warray-bounds warning (git-fixes).
- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).
- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).
- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).
- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).
- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).
- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).
- md/cluster: block reshape with remote resync job (bsc#1163727).
- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).
- md/raid5: fix oops during stripe resizing (git-fixes).
- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).
- media: cec-funcs.h: add status_req checks (git-fixes).
- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).
- media: gp8psk: initialize stats at power control logic (git-fixes).
- media: gspca: Fix memory leak in probe (git-fixes).
- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).
- media: i2c: ov2659: Fix missing 720p register config (git-fixes).
- media: i2c: ov2659: fix s_stream return value (git-fixes).
- media: msi2500: assign SPI bus number dynamically (git-fixes).
- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).
- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).
- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).
- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).
- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).
- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).
- media: si470x-i2c: add missed operations in remove (git-fixes).
- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).
- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).
- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).
- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).
- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).
- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).
- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).
- media: uvcvideo: Set media controller entity functions (git-fixes).
- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).
- media: v4l2-async: Fix trivial documentation typo (git-fixes).
- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).
- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).
- mei: bus: do not clean driver pointer (git-fixes).
- mei: protect mei_cl_mtu from null dereference (git-fixes).
- memstick: fix a double-free bug in memstick_check (git-fixes).
- memstick: r592: Fix error return in r592_probe() (git-fixes).
- mfd: rt5033: Fix errorneous defines (git-fixes).
- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).
- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).
- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).
- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).
- mm: do not wake kswapd prematurely when watermark boosting is disabled (git fixes (mm/vmscan)).
- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).
- net/smc: fix valid DMBE buffer sizes (git-fixes).
- net/x25: prevent a couple of overflows (bsc#1178590).
- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).
- net: aquantia: fix LRO with FCS error (git-fixes).
- net: bcmgenet: reapply manual settings to the PHY (git-fixes).
- net: broadcom/bcmsysport: Fix signedness in bcm_sysport_probe() (git-fixes).
- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).
- net: dsa: b53: Ensure the default VID is untagged (git-fixes).
- net: dsa: b53: Fix default VLAN ID (git-fixes).
- net: dsa: b53: Properly account for VLAN filtering (git-fixes).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).
- net: dsa: qca8k: remove leftover phy accessors (git-fixes).
- net: ethernet: stmmac: Fix signedness bug in ipq806x_gmac_of_parse() (git-fixes).
- net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).
- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).
- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).
- net: macb: add missing barriers when reading descriptors (git-fixes).
- net: macb: fix dropped RX frames due to a race (git-fixes).
- net: macb: fix error format in dev_err() (git-fixes).
- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes). - blacklist.conf:
- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).
- net: phy: Avoid multiple suspends (git-fixes).
- net: phy: micrel: Discern KSZ8051 and KSZ8795 PHYs (git-fixes).
- net: phy: micrel: make sure the factory test bit is cleared (git-fixes).
- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).
- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).
- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).
- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).
- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).
- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).
- net: stmmac: dwmac-meson8b: Fix signedness bug in probe (git-fixes).
- net: stmmac: fix csr_clk can't be zero issue (git-fixes).
- net: stmmac: fix length of PTP clock's name string (git-fixes).
- net: stmmac: gmac4+: Not all Unicast addresses may be available (git-fixes).
- net: usb: sr9800: fix uninitialized local variable (git-fixes).
- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).
- nfc: s3fwrn5: Release the nfc firmware (git-fixes).
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).
- ocfs2: fix unbalanced locking (bsc#1180506).
- ocfs2: initialize ip_next_orphan (bsc#1179724).
- orinoco: Move context allocation after processing the skb (git-fixes).
- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).
- parport: load lowlevel driver if ports not found (git-fixes).
- phy: Revert toggling reset changes (git-fixes).
- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).
- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).
- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).
- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).
- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).
- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).
- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).
- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).
- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).
- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).
- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).
- platform/x86: mlx-platform: remove an unused variable (git-fixes).
- power: supply: bq24190_charger: fix reference leak (git-fixes).
- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).
- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).
- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).
- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).
- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).
- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).
- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).
- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).
- powerpc/perf: Add generic compat mode pmu driver (bsc#1178900 ltc#189284).
- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).
- powerpc/perf: Fix crashes with generic_compat_pmu & BHRB (bsc#1178900 ltc#189284 git-fixes).
- powerpc/perf: init pmu from core-book3s (bsc#1178900 ltc#189284).
- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).
- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).
- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).
- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).
- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).
- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).
- ppp: remove the PPPIOCDETACH ioctl (git-fixes).
- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).
- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).
- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).
- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).
- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).
- regmap: debugfs: check count when read regmap file (git-fixes).
- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).
- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).
- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).
- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).
- reiserfs: Fix oops during mount (bsc#1179715).
- reiserfs: Initialize inode keys properly (bsc#1179713).
- remoteproc: Fix wrong rvring index computation (git-fixes).
- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).
- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014)
- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014)
- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045)
- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)
- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).
- rtc: 88pm860x: fix possible race condition (git-fixes).
- rtc: hym8563: enable wakeup when applicable (git-fixes).
- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).
- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).
- s390/bpf: Fix multiple tail calls (git-fixes).
- s390/cpuinfo: show processor physical address (git-fixes).
- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).
- s390/dasd: fix hanging device offline processing (bsc#1144912).
- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).
- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).
- s390/qeth: fix af_iucv notification race (git-fixes).
- s390/qeth: fix tear down of async TX buffers (git-fixes).
- s390/qeth: make af_iucv TX notification call more robust (git-fixes).
- s390/stp: add locking to sysfs functions (git-fixes).
- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).
- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section
- scsi: Remove unneeded break statements (bsc#1164780).
- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049, git-fixes).
- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).
- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).
- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).
- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).
- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).
- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).
- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).
- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).
- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).
- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).
- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).
- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).
- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).
- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).
- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).
- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).
- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).
- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).
- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).
- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).
- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).
- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).
- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).
- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).
- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).
- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).
- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).
- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).
- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).
- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).
- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).
- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).
- scsi: lpfc: Rework remote port lock handling (bsc#1164780).
- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).
- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).
- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).
- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).
- scsi: lpfc: Use generic power management (bsc#1164780).
- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).
- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).
- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).
- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).
- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).
- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).
- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).
- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).
- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).
- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).
- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).
- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).
- serial_core: Check for port state when tty is in error state (git-fixes).
- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).
- soc: imx: gpc: fix power up sequencing (git-fixes).
- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).
- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).
- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).
- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).
- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).
- spi: Fix memory leak on splited transfers (git-fixes).
- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).
- spi: davinci: Fix use-after-free on unbind (git-fixes).
- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).
- spi: dw: Fix Rx-only DMA transfers (git-fixes).
- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).
- spi: img-spfi: fix potential double release (git-fixes).
- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).
- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).
- spi: pxa2xx: Add missed security checks (git-fixes).
- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).
- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).
- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).
- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).
- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).
- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).
- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).
- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).
- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).
- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).
- spi: tegra20-slink: add missed clk_unprepare (git-fixes).
- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).
- splice: only read in as much information as there is pipe buffer space (bsc#1179520).
- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).
- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).
- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).
- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).
- staging: olpc_dcon: add a missing dependency (git-fixes).
- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).
- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).
- staging: rtl8188eu: fix possible null dereference (git-fixes).
- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).
- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).
- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).
- staging: wlan-ng: properly check endpoint types (git-fixes).
- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).
- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).
- timer: Fix wheel index calculation on last level (git fixes)
- timer: Prevent base->clk from moving backward (git-fixes)
- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).
- tty: always relink the port (git-fixes).
- tty: link tty and port before configuring it as console (git-fixes).
- tty: synclink_gt: Adjust indentation in several functions (git-fixes).
- tty: synclinkmp: Adjust indentation in several functions (git-fixes).
- tty:serial:mvebu-uart:fix a wrong return (git-fixes).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).
- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).
- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).
- usb: dwc2: Fix IN FIFO allocation (git-fixes).
- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).
- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).
- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).
- usb: fsl: Check memory resource before releasing it (git-fixes).
- usb: gadget: composite: Fix possible double free memory bug (git-fixes).
- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).
- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).
- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).
- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).
- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).
- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).
- usb: gadget: fix wrong endpoint desc (git-fixes).
- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).
- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).
- usb: gadget: select CONFIG_CRC32 (git-fixes).
- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).
- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).
- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).
- usb: hso: Fix debug compile warning on sparc32 (git-fixes).
- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).
- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).
- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).
- usblp: poison URBs upon disconnect (git-fixes).
- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).
- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).
- vt: Reject zero-sized screen buffer size (git-fixes).
- vt: do not hardcode the mem allocation upper bound (git-fixes).
- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).
- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).
- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).
- watchdog: da9062: do not ping the hw during stop() (git-fixes).
- watchdog: qcom: Avoid context switch in restart handler (git-fixes).
- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).
- wil6210: select CONFIG_CRC32 (git-fixes).
- wimax: fix duplicate initializer warning (git-fixes).
- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).
- wireless: Use offsetof instead of custom macro (git-fixes).
- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).
- x86/i8259: Use printk_deferred() to prevent deadlock (bsc#1112178).
- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).
- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).
- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).
- x86/mm/numa: Remove uninitialized_var() usage (bsc#1112178).
- x86/mm: Fix leak of pmd ptlock (bsc#1112178).
- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1112178).
- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Do not move a task to the same resource group (bsc#1112178).
- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).
- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).
- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).
- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1112178).
- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).
- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).
- x86/traps: Simplify pagefault tracing logic (bsc#1179895).
- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).
- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).
- xprtrdma: fix incorrect header size calculations (git-fixes).
Patchnames
openSUSE-2021-75
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for the Linux Kernel", title: "Title of the patch", }, { category: "description", text: "\n\nThe openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-29568: An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable (bnc#1179508).\n- CVE-2020-29569: The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback (bnc#1179509).\n- CVE-2020-25639: Bail out of nouveau_channel_new if channel init fails (bsc#1176846).\n- CVE-2020-28374: In drivers/target/target_core_xcopy.c insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore (bnc#1178372 1180676).\n- CVE-2020-36158: mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332 (bnc#1180559).\n- CVE-2020-27825: A use-after-free flaw was found in kernel/trace/ring_buffer.c. There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat (bnc#1179960).\n- CVE-2020-0466: In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180031).\n- CVE-2020-27068: In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation (bnc#1180086).\n- CVE-2020-0465: In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180029).\n- CVE-2020-0444: In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1180027).\n- CVE-2020-29660: A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may have allowed a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24 (bnc#1179745).\n- CVE-2020-29661: A locking issue was discovered in the tty subsystem of the Linux kernel drivers/tty/tty_jobctrl.c allowed a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b (bnc#1179745).\n- CVE-2020-27777: A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel (bnc#1179107).\n- CVE-2020-11668: In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandled invalid descriptors, aka CID-a246b4d54770 (bnc#1168952).\n- CVE-2019-20934: An issue was discovered in the Linux kernel On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c (bnc#1179663).\n- CVE-2020-27786: A flaw was found in the Linux kernels implementation of MIDI, where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation (bnc#1179601).\n- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666).\n\nThe following non-security bugs were fixed:\n\n- ACPI: PNP: compare the string length in the matching_id() (git-fixes).\n- ACPICA: Disassembler: create buffer fields in ACPI_PARSE_LOAD_PASS1 (git-fixes).\n- ACPICA: Do not increment operation_region reference counts for field units (git-fixes).\n- ALSA: ca0106: fix error code handling (git-fixes).\n- ALSA: ctl: allow TLV read operation for callback type of element in locked case (git-fixes).\n- ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO (git-fixes).\n- ALSA: hda/ca0132 - Change Input Source enum strings (git-fixes).\n- ALSA: hda/ca0132 - Fix AE-5 rear headphone pincfg (git-fixes).\n- ALSA: hda/generic: Add option to enforce preferred_dacs pairs (git-fixes).\n- ALSA: hda/hdmi: always check pin power status in i915 pin fixup (git-fixes).\n- ALSA: hda/realtek - Add new codec supported for ALC897 (git-fixes).\n- ALSA: hda/realtek - Couldn't detect Mic if booting with headset plugged (git-fixes).\n- ALSA: hda/realtek - Enable headset mic of ASUS Q524UQK with ALC255 (git-fixes).\n- ALSA: hda/realtek: Add mute LED quirk to yet another HP x360 model (git-fixes).\n- ALSA: hda/realtek: Add some Clove SSID in the ALC293(ALC1220) (git-fixes).\n- ALSA: hda/realtek: Enable front panel headset LED on Lenovo ThinkStation P520 (git-fixes).\n- ALSA: hda/realtek: Enable headset of ASUS UX482EG & B9400CEA with ALC294 (git-fixes).\n- ALSA: hda/via: Fix runtime PM for Clevo W35xSS (git-fixes).\n- ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table (git-fixes).\n- ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n- ALSA: hda: Fix regressions on clear and reconfig sysfs (git-fixes).\n- ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n- ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n- ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n- ALSA: pcm: Clear the full allocated memory at hw_params (git-fixes).\n- ALSA: pcm: oss: Fix a few more UBSAN fixes (git-fixes).\n- ALSA: pcm: oss: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check (git-fixes).\n- ALSA: timer: Limit max amount of slave instances (git-fixes).\n- ALSA: usb-audio: Add delay quirk for H570e USB headsets (git-fixes).\n- ALSA: usb-audio: Add delay quirk for all Logitech USB devices (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for MODX (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Qu-16 (git-fixes).\n- ALSA: usb-audio: Add implicit feedback quirk for Zoom UAC-2 (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Alpha S (git-fixes).\n- ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n- ALSA: usb-audio: Disable sample read check if firmware does not give back (git-fixes).\n- ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n- ALSA: usb-audio: Fix control 'access overflow' errors from chmap (git-fixes).\n- ALSA: usb-audio: Fix potential out-of-bounds shift (git-fixes).\n- ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n- ALSA: usb-audio: US16x08: fix value count for level meters (git-fixes).\n- ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n- ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n- ALSA: usb-audio: add usb vendor id as DSD-capable for Khadas devices (git-fixes).\n- ASoC: arizona: Fix a wrong free in wm8997_probe (git-fixes).\n- ASoC: cx2072x: Fix doubly definitions of Playback and Capture streams (git-fixes).\n- ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed (git-fixes).\n- ASoC: jz4740-i2s: add missed checks for clk_get() (git-fixes).\n- ASoC: pcm3168a: The codec does not support S32_LE (git-fixes).\n- ASoC: pcm: DRAIN support reactivation (git-fixes).\n- ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile (git-fixes).\n- ASoC: sti: fix possible sleep-in-atomic (git-fixes).\n- ASoC: wm8904: fix regcache handling (git-fixes).\n- ASoC: wm8998: Fix PM disable depth imbalance on error (git-fixes).\n- ASoC: wm_adsp: Do not generate kcontrols without READ flags (git-fixes).\n- ASoC: wm_adsp: remove 'ctl' from list on error in wm_adsp_create_control() (git-fixes).\n- Avoid a GCC warning about '/*' within a comment.\n- Bluetooth: Fix advertising duplicated flags (git-fixes).\n- Bluetooth: Fix null pointer dereference in hci_event_packet() (git-fixes).\n- Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt() (git-fixes).\n- Bluetooth: add a mutex lock to avoid UAF in do_enale_set (git-fixes).\n- Bluetooth: btusb: Fix detection of some fake CSR controllers with a bcdDevice val of 0x0134 (git-fixes).\n- Drop a backported uvcvideo patch that caused a regression (bsc#1180117) Also blacklisting the commit\n- EDAC/amd64: Fix PCI component registration (bsc#1112178).\n- HID: Add another Primax PIXART OEM mouse quirk (git-fixes).\n- HID: Fix slab-out-of-bounds read in hid_field_extract (bsc#1180052).\n- HID: Improve Windows Precision Touchpad detection (git-fixes).\n- HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n- HID: core: Correctly handle ReportSize being zero (git-fixes).\n- HID: core: check whether Usage Page item is after Usage ID items (git-fixes).\n- HID: cypress: Support Varmilo Keyboards' media hotkeys (git-fixes).\n- HID: hid-sensor-hub: Fix issue with devices with no report ID (git-fixes).\n- HID: intel-ish-hid: fix wrong error handling in ishtp_cl_alloc_tx_ring() (git-fixes).\n- HID: logitech-hidpp: Silence intermittent get_battery_capacity errors (git-fixes).\n- HSI: omap_ssi: Do not jump to free ID in ssi_add_controller() (git-fixes).\n- Input: ads7846 - fix integer overflow on Rt calculation (git-fixes).\n- Input: ads7846 - fix race that causes missing releases (git-fixes).\n- Input: ads7846 - fix unaligned access on 7845 (git-fixes).\n- Input: atmel_mxt_ts - disable IRQ across suspend (git-fixes).\n- Input: cm109 - do not stomp on control URB (git-fixes).\n- Input: cros_ec_keyb - send 'scancodes' in addition to key events (git-fixes).\n- Input: cyapa_gen6 - fix out-of-bounds stack access (git-fixes).\n- Input: goodix - add upside-down quirk for Teclast X98 Pro tablet (git-fixes).\n- Input: i8042 - add Acer laptops to the i8042 reset list (git-fixes).\n- Input: i8042 - add ByteSpeed touchpad to noloop table (git-fixes).\n- Input: i8042 - add Entroware Proteus EL07R4 to nomux and reset lists (git-fixes).\n- Input: i8042 - allow insmod to succeed on devices without an i8042 controller (git-fixes).\n- Input: i8042 - fix error return code in i8042_setup_aux() (git-fixes).\n- Input: omap4-keypad - fix runtime PM error handling (git-fixes).\n- Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n- Input: trackpoint - add new trackpoint variant IDs (git-fixes).\n- Input: trackpoint - enable Synaptics trackpoints (git-fixes).\n- Input: xpad - support Ardwiino Controllers (git-fixes).\n- KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits (bsc#1112178).\n- NFC: st95hf: Fix memleak in st95hf_in_send_cmd (git-fixes).\n- NFS: fix nfs_path in case of a rename retry (git-fixes).\n- NFSD: Add missing NFSv2 .pc_func methods (git-fixes).\n- NFSv4.2: fix client's attribute cache management for copy_file_range (git-fixes).\n- NFSv4.2: support EXCHGID4_FLAG_SUPP_FENCE_OPS 4.2 EXCHANGE_ID flag (git-fixes).\n- PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n- PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n- PCI: Fix pci_slot_release() NULL pointer dereference (git-fixes).\n- PM / hibernate: memory_bm_find_bit(): Tighten node optimisation (git-fixes).\n- PM: ACPI: Output correct message on target power state (git-fixes).\n- PM: hibernate: Freeze kernel threads in software_resume() (git-fixes).\n- PM: hibernate: remove the bogus call to get_gendisk() in software_resume() (git-fixes).\n- Revert 'ACPI / resources: Use AE_CTRL_TERMINATE to terminate resources walks' (git-fixes).\n- Revert 'ALSA: hda - Fix silent audio output and corrupted input on MSI X570-A PRO' (git-fixes).\n- Revert 'PM / devfreq: Modify the device name as devfreq(X) for sysfs' (git-fixes).\n- Revert 'device property: Keep secondary firmware node secondary by type' (git-fixes).\n- Revert 'platform/x86: wmi: Destroy on cleanup rather than unregister' (git-fixes).\n- Revert 'powerpc/pseries/hotplug-cpu: Remove double free in error path' (bsc#1065729).\n- Revert 'serial: amba-pl011: Make sure we initialize the port.lock spinlock' (git-fixes).\n- SMB3: Honor 'handletimeout' flag for multiuser mounts (bsc#1176558).\n- SMB3: Honor 'posix' flag for multiuser mounts (bsc#1176559).\n- SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n- SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment() (git-fixes).\n- SUNRPC: The RDMA back channel mustn't disappear while requests are outstanding (git-fixes).\n- USB: Fix: Do not skip endpoint descriptors with maxpacket=0 (git-fixes).\n- USB: Skip endpoints with 0 maxpacket length (git-fixes).\n- USB: UAS: introduce a quirk to set no_write_same (git-fixes).\n- USB: add RESET_RESUME quirk for Snapscan 1212 (git-fixes).\n- USB: dummy-hcd: Fix uninitialized array use in init() (git-fixes).\n- USB: gadget: f_acm: add support for SuperSpeed Plus (git-fixes).\n- USB: gadget: f_midi: setup SuperSpeed Plus descriptors (git-fixes).\n- USB: gadget: f_rndis: fix bitrate for SuperSpeed and above (git-fixes).\n- USB: gadget: legacy: fix return error code in acm_ms_bind() (git-fixes).\n- USB: ldusb: use unsigned size format specifiers (git-fixes).\n- USB: serial: ch341: add new Product ID for CH341A (git-fixes).\n- USB: serial: ch341: sort device-id entries (git-fixes).\n- USB: serial: digi_acceleport: clean up modem-control handling (git-fixes).\n- USB: serial: digi_acceleport: clean up set_termios (git-fixes).\n- USB: serial: digi_acceleport: fix write-wakeup deadlocks (git-fixes).\n- USB: serial: digi_acceleport: remove in_interrupt() usage.\n- USB: serial: digi_acceleport: remove redundant assignment to pointer priv (git-fixes).\n- USB: serial: digi_acceleport: rename tty flag variable (git-fixes).\n- USB: serial: digi_acceleport: use irqsave() in USB's complete callback (git-fixes).\n- USB: serial: iuu_phoenix: fix DMA from stack (git-fixes).\n- USB: serial: keyspan_pda: fix dropped unthrottle interrupts (git-fixes).\n- USB: serial: keyspan_pda: fix stalled writes (git-fixes).\n- USB: serial: keyspan_pda: fix tx-unthrottle use-after-free (git-fixes).\n- USB: serial: keyspan_pda: fix write deadlock (git-fixes).\n- USB: serial: keyspan_pda: fix write unthrottling (git-fixes).\n- USB: serial: keyspan_pda: fix write-wakeup use-after-free (git-fixes).\n- USB: serial: kl5kusb105: fix memleak on open (git-fixes).\n- USB: serial: mos7720: fix parallel-port state restore (git-fixes).\n- USB: serial: option: add Fibocom NL668 variants (git-fixes).\n- USB: serial: option: add interface-number sanity check to flag handling (git-fixes).\n- USB: serial: option: add support for Thales Cinterion EXS82 (git-fixes).\n- USB: serial: option: fix Quectel BG96 matching (git-fixes).\n- USB: xhci: fix U1/U2 handling for hardware with XHCI_INTEL_HOST quirk set (git-fixes).\n- USB: yurex: fix control-URB timeout handling (git-fixes).\n- ata/libata: Fix usage of page address by page_address in ata_scsi_mode_select_xlat function (git-fixes).\n- ath10k: Fix an error handling path (git-fixes).\n- ath10k: Release some resources in an error handling path (git-fixes).\n- ath10k: Remove msdu from idr when management pkt send fails (git-fixes).\n- ath10k: fix backtrace on coredump (git-fixes).\n- ath10k: fix get invalid tx rate for Mesh metric (git-fixes).\n- ath10k: fix offchannel tx failure when no ath10k_mac_tx_frm_has_freq (git-fixes).\n- ath6kl: fix enum-conversion warning (git-fixes).\n- ath9k_htc: Discard undersized packets (git-fixes).\n- ath9k_htc: Modify byte order for an error message (git-fixes).\n- ath9k_htc: Silence undersized packet warnings (git-fixes).\n- ath9k_htc: Use appropriate rs_datalen type (git-fixes).\n- backlight: lp855x: Ensure regulators are disabled on probe failure (git-fixes).\n- btmrvl: Fix firmware filename for sd8997 chipset (bsc#1172694).\n- btrfs: fix use-after-free on readahead extent after failure to create it (bsc#1179963).\n- btrfs: qgroup: do not commit transaction when we already hold the handle (bsc#1178634).\n- btrfs: qgroup: do not try to wait flushing if we're already holding a transaction (bsc#1179575).\n- btrfs: remove a BUG_ON() from merge_reloc_roots() (bsc#1174784).\n- bus: fsl-mc: fix error return code in fsl_mc_object_allocate() (git-fixes).\n- can: mcp251x: add error check when wq alloc failed (git-fixes).\n- can: softing: softing_netdev_open(): fix error handling (git-fixes).\n- cfg80211: initialize rekey_data (git-fixes).\n- cfg80211: regulatory: Fix inconsistent format argument (git-fixes).\n- cifs: add NULL check for ses->tcon_ipc (bsc#1178270).\n- cifs: allow syscalls to be restarted in __smb_send_rqst() (bsc#1176956).\n- cifs: fix check of tcon dfs in smb1 (bsc#1178270).\n- cifs: fix potential use-after-free in cifs_echo_request() (bsc#1139944).\n- cirrus: cs89x0: remove set but not used variable 'lp' (git-fixes).\n- cirrus: cs89x0: use devm_platform_ioremap_resource() to simplify code (git-fixes).\n- clk: at91: usb: continue if clk_hw_round_rate() return zero (git-fixes).\n- clk: mvebu: a3700: fix the XTAL MODE pin to MPP1_9 (git-fixes).\n- clk: qcom: Allow constant ratio freq tables for rcg (git-fixes).\n- clk: qcom: msm8916: Fix the address location of pll->config_reg (git-fixes).\n- clk: s2mps11: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1 (git-fixes).\n- clk: sunxi-ng: Make sure divider tables have sentinel (git-fixes).\n- clk: tegra: Fix Tegra PMC clock out parents (git-fixes).\n- clk: tegra: Fix duplicated SE clock entry (git-fixes).\n- clk: ti: Fix memleak in ti_fapll_synth_setup (git-fixes).\n- clk: ti: composite: fix memory leak (git-fixes).\n- clk: ti: dra7-atl-clock: Remove ti_clk_add_alias call (git-fixes).\n- clocksource/drivers/asm9260: Add a check for of_clk_get (git-fixes).\n- coredump: fix core_pattern parse error (git-fixes).\n- cpufreq: highbank: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- cpufreq: loongson1: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: scpi: Add missing MODULE_ALIAS (git-fixes).\n- cpufreq: st: Add missing MODULE_DEVICE_TABLE (git-fixes).\n- crypto: af_alg - avoid undefined behavior accessing salg_name (git-fixes).\n- crypto: omap-aes - Fix PM disable depth imbalance in omap_aes_probe (git-fixes).\n- crypto: qat - fix status check in qat_hal_put_rel_rd_xfer() (git-fixes).\n- crypto: talitos - Fix return type of current_desc_hdr() (git-fixes).\n- cw1200: fix missing destroy_workqueue() on error in cw1200_init_common (git-fixes).\n- dmaengine: xilinx_dma: check dma_async_device_register return value (git-fixes).\n- dmaengine: xilinx_dma: fix mixed_enum_type coverity warning (git-fixes).\n- docs: Fix reST markup when linking to sections (git-fixes).\n- drivers: base: Fix NULL pointer exception in __platform_driver_probe() if a driver developer is foolish (git-fixes).\n- drivers: soc: ti: knav_qmss_queue: Fix error return code in knav_queue_probe (git-fixes).\n- drm/amd/display: remove useless if/else (git-fixes).\n- drm/amdgpu: fix build_coefficients() argument (git-fixes).\n- drm/dp_aux_dev: check aux_dev before use in drm_dp_aux_dev_get_by_minor() (git-fixes).\n- drm/gma500: Fix out-of-bounds access to struct drm_device.vblank[] (bsc#1129770)\n- drm/gma500: fix double free of gma_connector (git-fixes).\n- drm/meson: dw-hdmi: Register a callback to disable the regulator (git-fixes).\n- drm/msm/dpu: Add newline to printks (git-fixes).\n- drm/msm/dsi_phy_10nm: implement PHY disabling (git-fixes).\n- drm/omap: dmm_tiler: fix return error code in omap_dmm_probe() (git-fixes).\n- drm/rockchip: Avoid uninitialized use of endpoint id in LVDS (git-fixes).\n- epoll: Keep a reference on files added to the check list (bsc#1180031).\n- ethernet: ucc_geth: fix use-after-free in ucc_geth_remove() (git-fixes).\n- ext4: correctly report 'not supported' for {usr,grp}jquota when !CONFIG_QUOTA (bsc#1179672).\n- ext4: fix bogus warning in ext4_update_dx_flag() (bsc#1179716).\n- ext4: fix error handling code in add_new_gdb (bsc#1179722).\n- ext4: fix invalid inode checksum (bsc#1179723).\n- ext4: fix leaking sysfs kobject after failed mount (bsc#1179670).\n- ext4: limit entries returned when counting fsmap records (bsc#1179671).\n- ext4: unlock xattr_sem properly in ext4_inline_data_truncate() (bsc#1179673).\n- extcon: max77693: Fix modalias string (git-fixes).\n- fbcon: Fix user font detection test at fbcon_resize(). (bsc#1112178)\n- fbcon: Remove the superfluous break (bsc#1129770)\n- firmware: qcom: scm: Ensure 'a0' status code is treated as signed (git-fixes).\n- fix regression in 'epoll: Keep a reference on files added to the check list' (bsc#1180031, git-fixes).\n- forcedeth: use per cpu to collect xmit/recv statistics (git-fixes).\n- fs: Do not invalidate page buffers in block_write_full_page() (bsc#1179711).\n- geneve: change from tx_error to tx_dropped on missing metadata (git-fixes).\n- genirq/irqdomain: Add an irq_create_mapping_affinity() function (bsc#1065729).\n- gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n- gpio: gpio-grgpio: fix possible sleep-in-atomic-context bugs in grgpio_irq_map/unmap() (git-fixes).\n- gpio: max77620: Add missing dependency on GPIOLIB_IRQCHIP (git-fixes).\n- gpio: max77620: Fixup debounce delays (git-fixes).\n- gpio: max77620: Use correct unit for debounce times (git-fixes).\n- gpio: mpc8xxx: Add platform device to gpiochip->parent (git-fixes).\n- gpio: mvebu: fix potential user-after-free on probe (git-fixes).\n- gpiolib: acpi: Add honor_wakeup module-option + quirk mechanism (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 BYT + AXP288 model (git-fixes).\n- gpiolib: acpi: Add quirk to ignore EC wakeups on HP x2 10 CHT + AXP288 model (git-fixes).\n- gpiolib: acpi: Correct comment for HP x2 10 honor_wakeup quirk (git-fixes).\n- gpiolib: acpi: Rework honor_wakeup option into an ignore_wake option (git-fixes).\n- gpiolib: acpi: Turn dmi_system_id table into a generic quirk table (git-fixes).\n- gpiolib: fix up emulated open drain outputs (git-fixes).\n- hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n- hwmon: (jc42) Fix name to have no illegal characters (git-fixes).\n- i2c: algo: pca: Reapply i2c bus settings after reset (git-fixes).\n- i2c: i801: Fix resume bug (git-fixes).\n- i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets (git-fixes).\n- i2c: pxa: clear all master action bits in i2c_pxa_stop_message() (git-fixes).\n- i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n- i2c: qup: Fix error return code in qup_i2c_bam_schedule_desc() (git-fixes).\n- ibmvnic: add some debugs (bsc#1179896 ltc#190255).\n- ibmvnic: avoid memset null scrq msgs (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: continue fatal error reset after passive init (bsc#1171078 ltc#184239 git-fixes).\n- ibmvnic: delay next reset if hard reset fails (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: enhance resetting status check during module exit (bsc#1065729).\n- ibmvnic: fix NULL pointer dereference in reset_sub_crq_queues (bsc#1040855 ltc#155067 git-fixes).\n- ibmvnic: fix call_netdevice_notifiers in do_reset (bsc#1115431 ltc#171853 git-fixes).\n- ibmvnic: fix: NULL pointer dereference (bsc#1044767 ltc#155231 git-fixes).\n- ibmvnic: notify peers when failover and migration happen (bsc#1044120 ltc#155423 git-fixes).\n- ibmvnic: restore adapter state on failed reset (bsc#1152457 ltc#174432 git-fixes).\n- iio: adc: max1027: Reset the device at probe time (git-fixes).\n- iio: adc: rockchip_saradc: fix missing clk_disable_unprepare() on error in rockchip_saradc_resume (git-fixes).\n- iio: bmp280: fix compensation of humidity (git-fixes).\n- iio: buffer: Fix demux update (git-fixes).\n- iio: dac: ad5592r: fix unbalanced mutex unlocks in ad5592r_read_raw() (git-fixes).\n- iio: fix center temperature of bmc150-accel-core (git-fixes).\n- iio: humidity: hdc100x: fix IIO_HUMIDITYRELATIVE channel reporting (git-fixes).\n- iio: light: bh1750: Resolve compiler warning and make code more readable (git-fixes).\n- iio: srf04: fix wrong limitation in distance measuring (git-fixes).\n- iio:imu:bmi160: Fix too large a buffer (git-fixes).\n- iio:pressure:mpl3115: Force alignment of buffer (git-fixes).\n- inet_ecn: Fix endianness of checksum update when setting ECT(1) (git-fixes).\n- ipw2x00: Fix -Wcast-function-type (git-fixes).\n- irqchip/alpine-msi: Fix freeing of interrupts on allocation error path (git-fixes).\n- iwlwifi: mvm: fix kernel panic in case of assert during CSA (git-fixes).\n- iwlwifi: mvm: fix unaligned read of rx_pkt_status (git-fixes).\n- iwlwifi: pcie: limit memory read spin time (git-fixes).\n- kABI fix for g2d (git-fixes).\n- kABI workaround for HD-audio generic parser (git-fixes).\n- kABI workaround for dsa/b53 changes (git-fixes).\n- kABI workaround for net/ipvlan changes (git-fixes).\n- kABI: ath10k: move a new structure member to the end (git-fixes).\n- kABI: genirq: add back irq_create_mapping (bsc#1065729).\n- kernel-source.spec: Fix build with rpm 4.16 (boo#1179015).\n- kernel-{binary,source}.spec.in: do not create loop symlinks (bsc#1179082)\n- kgdb: Fix spurious true from in_dbg_master() (git-fixes).\n- mac80211: Check port authorization in the ieee80211_tx_dequeue() case (git-fixes).\n- mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n- mac80211: do not set set TDLS STA bandwidth wider than possible (git-fixes).\n- mac80211: fix authentication with iwlwifi/mvm (git-fixes).\n- mac80211: fix use of skb payload instead of header (git-fixes).\n- mac80211: mesh: fix mesh_pathtbl_init() error path (git-fixes).\n- matroxfb: avoid -Warray-bounds warning (git-fixes).\n- md-cluster: fix rmmod issue when md_cluster convert bitmap to none (bsc#1163727).\n- md-cluster: fix safemode_delay value when converting to clustered bitmap (bsc#1163727).\n- md-cluster: fix wild pointer of unlock_all_bitmaps() (bsc#1163727).\n- md/bitmap: fix memory leak of temporary bitmap (bsc#1163727).\n- md/bitmap: md_bitmap_get_counter returns wrong blocks (bsc#1163727).\n- md/bitmap: md_bitmap_read_sb uses wrong bitmap blocks (bsc#1163727).\n- md/cluster: block reshape with remote resync job (bsc#1163727).\n- md/cluster: fix deadlock when node is doing resync job (bsc#1163727).\n- md/raid5: fix oops during stripe resizing (git-fixes).\n- media: am437x-vpfe: Setting STD to current value is not an error (git-fixes).\n- media: cec-funcs.h: add status_req checks (git-fixes).\n- media: cx88: Fix some error handling path in 'cx8800_initdev()' (git-fixes).\n- media: gp8psk: initialize stats at power control logic (git-fixes).\n- media: gspca: Fix memory leak in probe (git-fixes).\n- media: i2c: mt9v032: fix enum mbus codes and frame sizes (git-fixes).\n- media: i2c: ov2659: Fix missing 720p register config (git-fixes).\n- media: i2c: ov2659: fix s_stream return value (git-fixes).\n- media: msi2500: assign SPI bus number dynamically (git-fixes).\n- media: mtk-mdp: Fix a refcounting bug on error in init (git-fixes).\n- media: mtk-vcodec: add missing put_device() call in mtk_vcodec_release_dec_pm() (git-fixes).\n- media: platform: add missing put_device() call in mtk_jpeg_probe() and mtk_jpeg_remove() (git-patches).\n- media: pvrusb2: Fix oops on tear-down when radio support is not present (git-fixes).\n- media: s5p-g2d: Fix a memory leak in an error handling path in 'g2d_probe()' (git-fixes).\n- media: saa7146: fix array overflow in vidioc_s_audio() (git-fixes).\n- media: si470x-i2c: add missed operations in remove (git-fixes).\n- media: siano: fix memory leak of debugfs members in smsdvb_hotplug (git-fixes).\n- media: solo6x10: fix missing snd_card_free in error handling case (git-fixes).\n- media: sti: bdisp: fix a possible sleep-in-atomic-context bug in bdisp_device_run() (git-fixes).\n- media: sunxi-cir: ensure IR is handled when it is continuous (git-fixes).\n- media: ti-vpe: vpe: Make sure YUYV is set as default format (git-fixes).\n- media: ti-vpe: vpe: ensure buffers are cleaned up properly in abort cases (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure about invalid sizeimage (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance failure causing a kernel panic (git-fixes).\n- media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format (git-fixes).\n- media: uvcvideo: Set media controller entity functions (git-fixes).\n- media: uvcvideo: Silence shift-out-of-bounds warning (git-fixes).\n- media: v4l2-async: Fix trivial documentation typo (git-fixes).\n- media: v4l2-core: fix touch support in v4l_g_fmt (git-fixes).\n- media: v4l2-device.h: Explicitly compare grp{id,mask} to zero in v4l2_device macros (git-fixes).\n- mei: bus: do not clean driver pointer (git-fixes).\n- mei: protect mei_cl_mtu from null dereference (git-fixes).\n- memstick: fix a double-free bug in memstick_check (git-fixes).\n- memstick: r592: Fix error return in r592_probe() (git-fixes).\n- mfd: rt5033: Fix errorneous defines (git-fixes).\n- mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n- misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() (git-fixes).\n- mm,memory_failure: always pin the page in madvise_inject_error (bsc#1180258).\n- mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault() (bsc#1179204).\n- mm: do not wake kswapd prematurely when watermark boosting is disabled (git fixes (mm/vmscan)).\n- mwifiex: fix mwifiex_shutdown_sw() causing sw reset failure (git-fixes).\n- net/smc: fix valid DMBE buffer sizes (git-fixes).\n- net/x25: prevent a couple of overflows (bsc#1178590).\n- net: aquantia: Fix aq_vec_isr_legacy() return value (git-fixes).\n- net: aquantia: fix LRO with FCS error (git-fixes).\n- net: bcmgenet: reapply manual settings to the PHY (git-fixes).\n- net: broadcom/bcmsysport: Fix signedness in bcm_sysport_probe() (git-fixes).\n- net: dsa: b53: Always use dev->vlan_enabled in b53_configure_vlan() (git-fixes).\n- net: dsa: b53: Ensure the default VID is untagged (git-fixes).\n- net: dsa: b53: Fix default VLAN ID (git-fixes).\n- net: dsa: b53: Properly account for VLAN filtering (git-fixes).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: bcm_sf2: potential array overflow in bcm_sf2_sw_suspend() (git-fixes).\n- net: dsa: qca8k: remove leftover phy accessors (git-fixes).\n- net: ethernet: stmmac: Fix signedness bug in ipq806x_gmac_of_parse() (git-fixes).\n- net: ethernet: ti: cpsw: clear all entries when delete vid (git-fixes).\n- net: ethernet: ti: cpsw: fix runtime_pm while add/kill vlan (git-fixes).\n- net: hisilicon: Fix signedness bug in hix5hd2_dev_probe() (git-fixes).\n- net: macb: add missing barriers when reading descriptors (git-fixes).\n- net: macb: fix dropped RX frames due to a race (git-fixes).\n- net: macb: fix error format in dev_err() (git-fixes).\n- net: macb: fix random memory corruption on RX with 64-bit DMA (git-fixes). - blacklist.conf:\n- net: pasemi: fix an use-after-free in pasemi_mac_phy_init() (git-fixes).\n- net: phy: Avoid multiple suspends (git-fixes).\n- net: phy: micrel: Discern KSZ8051 and KSZ8795 PHYs (git-fixes).\n- net: phy: micrel: make sure the factory test bit is cleared (git-fixes).\n- net: qca_spi: Move reset_count to struct qcaspi (git-fixes).\n- net: seeq: Fix the function used to release some memory in an error handling path (git-fixes).\n- net: sh_eth: fix a missing check of of_get_phy_mode (git-fixes).\n- net: sonic: replace dev_kfree_skb in sonic_send_packet (git-fixes).\n- net: sonic: return NETDEV_TX_OK if failed to map buffer (git-fixes).\n- net: stmmac: Fix reception of Broadcom switches tags (git-fixes).\n- net: stmmac: dwmac-meson8b: Fix signedness bug in probe (git-fixes).\n- net: stmmac: fix csr_clk can't be zero issue (git-fixes).\n- net: stmmac: fix length of PTP clock's name string (git-fixes).\n- net: stmmac: gmac4+: Not all Unicast addresses may be available (git-fixes).\n- net: usb: sr9800: fix uninitialized local variable (git-fixes).\n- net:ethernet:aquantia: Extra spinlocks removed (git-fixes).\n- nfc: s3fwrn5: Release the nfc firmware (git-fixes).\n- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n- ocfs2: fix unbalanced locking (bsc#1180506).\n- ocfs2: initialize ip_next_orphan (bsc#1179724).\n- orinoco: Move context allocation after processing the skb (git-fixes).\n- pNFS/flexfiles: Fix list corruption if the mirror count changes (git-fixes).\n- parport: load lowlevel driver if ports not found (git-fixes).\n- phy: Revert toggling reset changes (git-fixes).\n- pinctrl: amd: fix __iomem annotation in amd_gpio_irq_handler() (git-fixes).\n- pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n- pinctrl: amd: remove debounce filter setting in IRQ type setting (git-fixes).\n- pinctrl: baytrail: Avoid clearing debounce value when turning it off (git-fixes).\n- pinctrl: falcon: add missing put_device() call in pinctrl_falcon_probe() (git-fixes).\n- pinctrl: merrifield: Set default bias in case no particular value given (git-fixes).\n- pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B (git-fixes).\n- platform/x86: acer-wmi: add automatic keyboard background light toggle key as KEY_LIGHTS_TOGGLE (git-fixes).\n- platform/x86: dell-smbios-base: Fix error return code in dell_smbios_init (git-fixes).\n- platform/x86: mlx-platform: Fix item counter assignment for MSN2700, MSN24xx systems (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from MSN274x platform configuration (git-fixes).\n- platform/x86: mlx-platform: Remove PSU EEPROM from default platform configuration (git-fixes).\n- platform/x86: mlx-platform: remove an unused variable (git-fixes).\n- power: supply: bq24190_charger: fix reference leak (git-fixes).\n- power: supply: bq27xxx_battery: Silence deferred-probe error (git-fixes).\n- powerpc/64: Set up a kernel stack for secondaries before cpu_restore() (bsc#1065729).\n- powerpc/64s/pseries: Fix hash tlbiel_all_isa300 for guest kernels (bsc#1179888 ltc#190253).\n- powerpc/64s: Fix hash ISA v3.0 TLBIEL instruction generation (bsc#1055117 ltc#159753 git-fixes bsc#1179888 ltc#190253).\n- powerpc/pci: Fix broken INTx configuration via OF (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove LSI mappings on device teardown (bsc#1172145 ltc#184630).\n- powerpc/pci: Remove legacy debug code (bsc#1172145 ltc#184630 git-fixes).\n- powerpc/pci: Use of_irq_parse_and_map_pci() helper (bsc#1172145 ltc#184630).\n- powerpc/perf: Add generic compat mode pmu driver (bsc#1178900 ltc#189284).\n- powerpc/perf: Fix crash with is_sier_available when pmu is not set (bsc#1179578 ltc#189313).\n- powerpc/perf: Fix crashes with generic_compat_pmu & BHRB (bsc#1178900 ltc#189284 git-fixes).\n- powerpc/perf: init pmu from core-book3s (bsc#1178900 ltc#189284).\n- powerpc/pseries/hibernation: remove redundant cacheinfo update (bsc#1138374 ltc#178199 git-fixes).\n- powerpc/pseries: Pass MSI affinity to irq_create_mapping() (bsc#1065729).\n- powerpc/smp: Add __init to init_big_cores() (bsc#1109695 ltc#171067 git-fixes).\n- powerpc/xmon: Change printk() to pr_cont() (bsc#1065729).\n- powerpc: Convert to using %pOF instead of full_name (bsc#1172145 ltc#184630).\n- powerpc: Fix incorrect stw{, ux, u, x} instructions in __set_pte_at (bsc#1065729).\n- ppp: remove the PPPIOCDETACH ioctl (git-fixes).\n- pwm: lp3943: Dynamically allocate PWM chip base (git-fixes).\n- quota: clear padding in v2r1_mem2diskdqb() (bsc#1179714).\n- radeon: insert 10ms sleep in dce5_crtc_load_lut (git-fixes).\n- ravb: Fix use-after-free ravb_tstamp_skb (git-fixes).\n- regmap: Remove duplicate `type` field from regmap `regcache_sync` trace event (git-fixes).\n- regmap: debugfs: check count when read regmap file (git-fixes).\n- regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n- regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() (git-fixes).\n- regulator: pfuze100-regulator: Variable 'val' in pfuze100_regulator_probe() could be uninitialized (git-fixes).\n- regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone (git-fixes).\n- reiserfs: Fix oops during mount (bsc#1179715).\n- reiserfs: Initialize inode keys properly (bsc#1179713).\n- remoteproc: Fix wrong rvring index computation (git-fixes).\n- rfkill: Fix incorrect check to avoid NULL pointer dereference (git-fixes).\n- rpm/kernel-binary.spec.in: avoid using barewords (bsc#1179014) \n- rpm/kernel-binary.spec.in: avoid using more barewords (bsc#1179014) \n- rpm/kernel-binary.spec.in: use grep -E instead of egrep (bsc#1179045) \n- rpm/kernel-obs-build.spec.in: Add -q option to modprobe calls (bsc#1178401)\n- rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).\n- rtc: 88pm860x: fix possible race condition (git-fixes).\n- rtc: hym8563: enable wakeup when applicable (git-fixes).\n- rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot (git-fixes).\n- rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() (git-fixes).\n- s390/bpf: Fix multiple tail calls (git-fixes).\n- s390/cpuinfo: show processor physical address (git-fixes).\n- s390/cpum_sf.c: fix file permission for cpum_sfb_size (git-fixes).\n- s390/dasd: fix hanging device offline processing (bsc#1144912).\n- s390/dasd: fix null pointer dereference for ERP requests (git-fixes).\n- s390/pci: fix CPU address in MSI for directed IRQ (git-fixes).\n- s390/qeth: fix af_iucv notification race (git-fixes).\n- s390/qeth: fix tear down of async TX buffers (git-fixes).\n- s390/qeth: make af_iucv TX notification call more robust (git-fixes).\n- s390/stp: add locking to sysfs functions (git-fixes).\n- s390/zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl (git-fixes).\n- scripts/lib/SUSE/MyBS.pm: properly close prjconf Macros: section\n- scsi: Remove unneeded break statements (bsc#1164780).\n- scsi: core: Fix VPD LUN ID designator priorities (bsc#1178049, git-fixes).\n- scsi: lpfc: Add FDMI Vendor MIB support (bsc#1164780).\n- scsi: lpfc: Convert SCSI I/O completions to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Convert SCSI path to use common I/O submission path (bsc#1164780).\n- scsi: lpfc: Convert abort handling to SLI-3 and SLI-4 handlers (bsc#1164780).\n- scsi: lpfc: Correct null ndlp reference on routine exit (bsc#1164780).\n- scsi: lpfc: Drop nodelist reference on error in lpfc_gen_req() (bsc#1164780).\n- scsi: lpfc: Enable common send_io interface for SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enable common wqe_template support for both SCSI and NVMe (bsc#1164780).\n- scsi: lpfc: Enlarge max_sectors in scsi host templates (bsc#1164780).\n- scsi: lpfc: Extend the RDF FPIN Registration descriptor for additional events (bsc#1164780).\n- scsi: lpfc: Fix FLOGI/PLOGI receive race condition in pt2pt discovery (bsc#1164780).\n- scsi: lpfc: Fix NPIV Fabric Node reference counting (bsc#1164780).\n- scsi: lpfc: Fix NPIV discovery and Fabric Node detection (bsc#1164780).\n- scsi: lpfc: Fix duplicate wq_create_version check (bsc#1164780).\n- scsi: lpfc: Fix fall-through warnings for Clang (bsc#1164780).\n- scsi: lpfc: Fix invalid sleeping context in lpfc_sli4_nvmet_alloc() (bsc#1164780).\n- scsi: lpfc: Fix memory leak on lcb_context (bsc#1164780).\n- scsi: lpfc: Fix missing prototype for lpfc_nvmet_prep_abort_wqe() (bsc#1164780).\n- scsi: lpfc: Fix missing prototype warning for lpfc_fdmi_vendor_attr_mi() (bsc#1164780).\n- scsi: lpfc: Fix pointer defereference before it is null checked issue (bsc#1164780).\n- scsi: lpfc: Fix refcounting around SCSI and NVMe transport APIs (bsc#1164780).\n- scsi: lpfc: Fix removal of SCSI transport device get and put on dev structure (bsc#1164780).\n- scsi: lpfc: Fix scheduling call while in softirq context in lpfc_unreg_rpi (bsc#1164780).\n- scsi: lpfc: Fix set but not used warnings from Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Fix set but unused variables in lpfc_dev_loss_tmo_handler() (bsc#1164780).\n- scsi: lpfc: Fix spelling mistake 'Cant' -> 'Can't' (bsc#1164780).\n- scsi: lpfc: Fix variable 'vport' set but not used in lpfc_sli4_abts_err_handler() (bsc#1164780).\n- scsi: lpfc: Refactor WQE structure definitions for common use (bsc#1164780).\n- scsi: lpfc: Reject CT request for MIB commands (bsc#1164780).\n- scsi: lpfc: Remove dead code on second !ndlp check (bsc#1164780).\n- scsi: lpfc: Remove ndlp when a PLOGI/ADISC/PRLI/REG_RPI ultimately fails (bsc#1164780).\n- scsi: lpfc: Remove set but not used 'qp' (bsc#1164780).\n- scsi: lpfc: Remove unneeded variable 'status' in lpfc_fcp_cpu_map_store() (bsc#1164780).\n- scsi: lpfc: Removed unused macros in lpfc_attr.c (bsc#1164780).\n- scsi: lpfc: Rework locations of ndlp reference taking (bsc#1164780).\n- scsi: lpfc: Rework remote port lock handling (bsc#1164780).\n- scsi: lpfc: Rework remote port ref counting and node freeing (bsc#1164780).\n- scsi: lpfc: Unsolicited ELS leaves node in incorrect state while dropping it (bsc#1164780).\n- scsi: lpfc: Update changed file copyrights for 2020 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.4 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.5 (bsc#1164780).\n- scsi: lpfc: Update lpfc version to 12.8.0.6 (bsc#1164780).\n- scsi: lpfc: Use generic power management (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Demote kernel-doc format for redefined functions (bsc#1164780).\n- scsi: lpfc: lpfc_attr: Fix-up a bunch of kernel-doc misdemeanours (bsc#1164780).\n- scsi: lpfc: lpfc_debugfs: Fix a couple of function documentation issues (bsc#1164780).\n- scsi: lpfc: lpfc_scsi: Fix a whole host of kernel-doc issues (bsc#1164780).\n- scsi: qla2xxx: Change post del message from debug level to log level (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Convert to DEFINE_SHOW_ATTRIBUTE (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not check for fw_started while posting NVMe command (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Do not consume srb greedily (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix FW initialization error on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix N2N and NVMe connect retry failure (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix compilation issue in PPC systems (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix crash during driver load on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix device loss on 4G and older HBAs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix flash update in 28XX adapters on big endian machines (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix return of uninitialized value in rval (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Fix the call trace for flush workqueue (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle aborts correctly for port undergoing deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Handle incorrect entry_type entries (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: If fcport is undergoing deletion complete I/O with retry (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Initialize variable in qla8044_poll_reg() (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Limit interrupt vectors to number of CPUs (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Move sess cmd list/lock to driver (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla82xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove in_interrupt() from qla83xx-specific code (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Remove trailing semicolon in macro definition (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Return EBUSY on fcport deletion (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Tear down session if FW say it is down (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Update version to 10.02.00.104-k (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: Use constant when it is known (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: qla2xxx: remove incorrect sparse #ifdef (bsc#1172538 bsc#1179142 bsc#1179810).\n- scsi: storvsc: Fix error return in storvsc_probe() (git-fixes).\n- scsi: target: tcm_qla2xxx: Remove BUG_ON(in_interrupt()) (bsc#1172538 bsc#1179142 bsc#1179810).\n- serial: 8250_omap: Avoid FIFO corruption caused by MDR1 access (git-fixes).\n- serial: 8250_pci: Add Realtek 816a and 816b (git-fixes).\n- serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n- serial: ar933x_uart: set UART_CS_{RX,TX}_READY_ORIDE (git-fixes).\n- serial: txx9: add missing platform_driver_unregister() on error in serial_txx9_init (git-fixes).\n- serial_core: Check for port state when tty is in error state (git-fixes).\n- soc/tegra: fuse: Fix index bug in get_process_id (git-fixes).\n- soc: imx: gpc: fix power up sequencing (git-fixes).\n- soc: mediatek: Check if power domains can be powered on at boot time (git-fixes).\n- soc: qcom: smp2p: Safely acquire spinlock without IRQs (git-fixes).\n- soc: ti: Fix reference imbalance in knav_dma_probe (git-fixes).\n- soc: ti: knav_qmss: fix reference leak in knav_queue_probe (git-fixes).\n- spi: Add call to spi_slave_abort() function when spidev driver is released (git-fixes).\n- spi: Fix memory leak on splited transfers (git-fixes).\n- spi: bcm63xx-hsspi: fix missing clk_disable_unprepare() on error in bcm63xx_hsspi_resume (git-fixes).\n- spi: davinci: Fix use-after-free on unbind (git-fixes).\n- spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n- spi: dw: Fix Rx-only DMA transfers (git-fixes).\n- spi: dw: Return any value retrieved from the dma_transfer callback (git-fixes).\n- spi: img-spfi: fix potential double release (git-fixes).\n- spi: img-spfi: fix reference leak in img_spfi_resume (git-fixes).\n- spi: pic32: Do not leak DMA channels in probe error path (git-fixes).\n- spi: pxa2xx: Add missed security checks (git-fixes).\n- spi: spi-cavium-thunderx: Add missing pci_release_regions() (git-fixes).\n- spi: spi-loopback-test: Fix out-of-bounds read (git-fixes).\n- spi: spi-mem: Fix passing zero to 'PTR_ERR' warning (git-fixes).\n- spi: spi-mem: fix reference leak in spi_mem_access_start (git-fixes).\n- spi: spi-ti-qspi: fix reference leak in ti_qspi_setup (git-fixes).\n- spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n- spi: st-ssc4: Fix unbalanced pm_runtime_disable() in probe error path (git-fixes).\n- spi: st-ssc4: add missed pm_runtime_disable (git-fixes).\n- spi: tegra114: fix reference leak in tegra spi ops (git-fixes).\n- spi: tegra20-sflash: fix reference leak in tegra_sflash_resume (git-fixes).\n- spi: tegra20-slink: add missed clk_unprepare (git-fixes).\n- spi: tegra20-slink: fix reference leak in slink ops of tegra20 (git-fixes).\n- splice: only read in as much information as there is pipe buffer space (bsc#1179520).\n- staging: comedi: check validity of wMaxPacketSize of usb endpoints found (git-fixes).\n- staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value (git-fixes).\n- staging: comedi: mf6x4: Fix AI end-of-conversion detection (git-fixes).\n- staging: olpc_dcon: Do not call platform_device_unregister() in dcon_probe() (git-fixes).\n- staging: olpc_dcon: add a missing dependency (git-fixes).\n- staging: rtl8188eu: Add device code for TP-Link TL-WN727N v5.21 (git-fixes).\n- staging: rtl8188eu: Add device id for MERCUSYS MW150US v2 (git-fixes).\n- staging: rtl8188eu: fix possible null dereference (git-fixes).\n- staging: rtl8192u: fix multiple memory leaks on error path (git-fixes).\n- staging: vt6656: set usb_set_intfdata on driver fail (git-fixes).\n- staging: wlan-ng: fix out of bounds read in prism2sta_probe_usb() (git-fixes).\n- staging: wlan-ng: properly check endpoint types (git-fixes).\n- sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n- thunderbolt: Use 32-bit writes when writing ring producer/consumer (git-fixes).\n- timer: Fix wheel index calculation on last level (git fixes)\n- timer: Prevent base->clk from moving backward (git-fixes)\n- tty: Fix ->pgrp locking in tiocspgrp() (git-fixes).\n- tty: always relink the port (git-fixes).\n- tty: link tty and port before configuring it as console (git-fixes).\n- tty: synclink_gt: Adjust indentation in several functions (git-fixes).\n- tty: synclinkmp: Adjust indentation in several functions (git-fixes).\n- tty:serial:mvebu-uart:fix a wrong return (git-fixes).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (git-fixes).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul (git-fixes).\n- usb: chipidea: ci_hdrc_imx: add missing put_device() call in usbmisc_get_init_data() (git-fixes).\n- usb: dwc2: Fix IN FIFO allocation (git-fixes).\n- usb: dwc3: remove the call trace of USBx_GFLADJ (git-fixes).\n- usb: dwc3: ulpi: Use VStsDone to detect PHY regs access completion (git-fixes).\n- usb: ehci-omap: Fix PM disable depth umbalance in ehci_hcd_omap_probe (git-fixes).\n- usb: fsl: Check memory resource before releasing it (git-fixes).\n- usb: gadget: composite: Fix possible double free memory bug (git-fixes).\n- usb: gadget: configfs: Fix missing spin_lock_init() (git-fixes).\n- usb: gadget: configfs: Preserve function ordering after bind failure (git-fixes).\n- usb: gadget: configfs: fix concurrent issue between composite APIs (git-fixes).\n- usb: gadget: f_fs: Use local copy of descriptors for userspace copy (git-fixes).\n- usb: gadget: f_uac2: reset wMaxPacketSize (git-fixes).\n- usb: gadget: ffs: ffs_aio_cancel(): Save/restore IRQ flags (git-fixes).\n- usb: gadget: fix wrong endpoint desc (git-fixes).\n- usb: gadget: goku_udc: fix potential crashes in probe (git-fixes).\n- usb: gadget: net2280: fix memory leak on probe error handling paths (git-fixes).\n- usb: gadget: select CONFIG_CRC32 (git-fixes).\n- usb: gadget: serial: fix Tx stall after buffer overflow (git-fixes).\n- usb: gadget: udc: fix possible sleep-in-atomic-context bugs in gr_probe() (git-fixes).\n- usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n- usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n- usb: musb: omap2430: Get rid of musb .set_vbus for omap2430 glue (git-fixes).\n- usb: oxu210hp-hcd: Fix memory leak in oxu_create (git-fixes).\n- usb: usbfs: Suppress problematic bind and unbind uevents (git-fixes).\n- usblp: poison URBs upon disconnect (git-fixes).\n- usbnet: ipheth: fix connectivity with iOS 14 (git-fixes).\n- video: fbdev: neofb: fix memory leak in neo_scan_monitor() (git-fixes).\n- vt: Reject zero-sized screen buffer size (git-fixes).\n- vt: do not hardcode the mem allocation upper bound (git-fixes).\n- wan: ds26522: select CONFIG_BITREVERSE (git-fixes).\n- watchdog: coh901327: add COMMON_CLK dependency (git-fixes).\n- watchdog: da9062: No need to ping manually before setting timeout (git-fixes).\n- watchdog: da9062: do not ping the hw during stop() (git-fixes).\n- watchdog: qcom: Avoid context switch in restart handler (git-fixes).\n- watchdog: sirfsoc: Add missing dependency on HAS_IOMEM (git-fixes).\n- wil6210: select CONFIG_CRC32 (git-fixes).\n- wimax: fix duplicate initializer warning (git-fixes).\n- wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n- wireless: Use offsetof instead of custom macro (git-fixes).\n- x86/apic: Fix integer overflow on 10 bit left shift of cpu_khz (bsc#1112178).\n- x86/i8259: Use printk_deferred() to prevent deadlock (bsc#1112178).\n- x86/insn-eval: Use new for_each_insn_prefix() macro to loop over prefixes bytes (bsc#1112178).\n- x86/mm/ident_map: Check for errors from ident_pud_init() (bsc#1112178).\n- x86/mm/mem_encrypt: Fix definition of PMD_FLAGS_DEC_WP (bsc#1112178).\n- x86/mm/numa: Remove uninitialized_var() usage (bsc#1112178).\n- x86/mm: Fix leak of pmd ptlock (bsc#1112178).\n- x86/mtrr: Correct the range check before performing MTRR type lookups (bsc#1112178).\n- x86/resctrl: Add necessary kernfs_put() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Do not move a task to the same resource group (bsc#1112178).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1112178).\n- x86/resctrl: Remove superfluous kernfs_get() calls to prevent refcount leak (bsc#1112178).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1112178).\n- x86/resctrl: Use an IPI instead of task_work_add() to update PQR_ASSOC MSR (bsc#1112178).\n- x86/speculation: Fix prctl() when spectre_v2_user={seccomp,prctl},ibpb (bsc#1112178).\n- x86/tracing: Introduce a static key for exception tracing (bsc#1179895).\n- x86/traps: Simplify pagefault tracing logic (bsc#1179895).\n- x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes (bsc#1112178).\n- xhci: Give USB2 ports time to enter U3 in bus suspend (git-fixes).\n- xprtrdma: fix incorrect header size calculations (git-fixes).\n", title: "Description of the patch", }, { category: "details", text: "openSUSE-2021-75", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_0075-1.json", }, { category: "self", summary: "URL for openSUSE-SU-2021:0075-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/", }, { category: "self", summary: "E-Mail link for openSUSE-SU-2021:0075-1", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/H7EJISS2OPKUSJFJ2BG5ZWHA2Z6H3VQB/", }, { category: "self", summary: "SUSE Bug 1040855", url: "https://bugzilla.suse.com/1040855", }, { category: "self", summary: "SUSE Bug 1044120", url: "https://bugzilla.suse.com/1044120", }, { category: "self", summary: "SUSE Bug 1044767", url: "https://bugzilla.suse.com/1044767", }, { category: "self", summary: "SUSE Bug 1055117", url: "https://bugzilla.suse.com/1055117", }, { category: "self", summary: "SUSE Bug 1065729", url: "https://bugzilla.suse.com/1065729", }, { category: "self", summary: "SUSE Bug 1094840", url: "https://bugzilla.suse.com/1094840", }, { category: "self", summary: "SUSE Bug 1109695", url: "https://bugzilla.suse.com/1109695", }, { category: "self", summary: "SUSE Bug 1112178", url: "https://bugzilla.suse.com/1112178", }, { category: "self", summary: "SUSE Bug 1115431", url: "https://bugzilla.suse.com/1115431", }, { category: "self", summary: "SUSE Bug 1129770", url: "https://bugzilla.suse.com/1129770", }, { category: "self", summary: "SUSE Bug 1138374", url: "https://bugzilla.suse.com/1138374", }, { category: "self", summary: "SUSE Bug 1139944", url: "https://bugzilla.suse.com/1139944", }, { category: "self", summary: "SUSE Bug 1144912", url: "https://bugzilla.suse.com/1144912", }, { category: "self", summary: "SUSE Bug 1152457", url: "https://bugzilla.suse.com/1152457", }, { category: "self", summary: "SUSE Bug 1163727", url: "https://bugzilla.suse.com/1163727", }, { category: "self", summary: "SUSE Bug 1164780", url: "https://bugzilla.suse.com/1164780", }, { category: "self", summary: "SUSE Bug 1168952", url: "https://bugzilla.suse.com/1168952", }, { category: "self", summary: "SUSE Bug 1171078", url: "https://bugzilla.suse.com/1171078", }, { category: "self", summary: "SUSE Bug 1172145", url: "https://bugzilla.suse.com/1172145", }, { category: "self", summary: "SUSE Bug 1172538", url: "https://bugzilla.suse.com/1172538", }, { category: "self", summary: "SUSE Bug 1172694", url: "https://bugzilla.suse.com/1172694", }, { category: "self", summary: "SUSE Bug 1174784", url: "https://bugzilla.suse.com/1174784", }, { category: "self", summary: "SUSE Bug 1176558", url: "https://bugzilla.suse.com/1176558", }, { category: "self", summary: "SUSE Bug 1176559", url: "https://bugzilla.suse.com/1176559", }, { category: "self", summary: "SUSE Bug 1176846", url: "https://bugzilla.suse.com/1176846", }, { category: "self", summary: "SUSE Bug 1176956", url: "https://bugzilla.suse.com/1176956", }, { category: "self", summary: "SUSE Bug 1177666", url: "https://bugzilla.suse.com/1177666", }, { category: "self", summary: "SUSE Bug 1178049", url: "https://bugzilla.suse.com/1178049", }, { category: "self", summary: "SUSE Bug 1178270", url: "https://bugzilla.suse.com/1178270", }, { category: "self", summary: "SUSE Bug 1178372", url: "https://bugzilla.suse.com/1178372", }, { category: "self", summary: "SUSE Bug 1178401", url: "https://bugzilla.suse.com/1178401", }, { category: "self", summary: "SUSE Bug 1178590", url: "https://bugzilla.suse.com/1178590", }, { category: "self", summary: "SUSE Bug 1178634", url: "https://bugzilla.suse.com/1178634", }, { category: "self", summary: "SUSE Bug 1178762", url: "https://bugzilla.suse.com/1178762", }, { category: "self", summary: "SUSE Bug 1178900", url: "https://bugzilla.suse.com/1178900", }, { category: "self", summary: "SUSE Bug 1179014", url: "https://bugzilla.suse.com/1179014", }, { category: "self", summary: "SUSE Bug 1179015", url: "https://bugzilla.suse.com/1179015", }, { category: "self", summary: "SUSE Bug 1179045", url: "https://bugzilla.suse.com/1179045", }, { category: "self", summary: "SUSE Bug 1179082", url: "https://bugzilla.suse.com/1179082", }, { category: "self", summary: "SUSE Bug 1179107", url: "https://bugzilla.suse.com/1179107", }, { category: "self", summary: "SUSE Bug 1179142", url: "https://bugzilla.suse.com/1179142", }, { category: "self", summary: "SUSE Bug 1179204", url: "https://bugzilla.suse.com/1179204", }, { category: "self", summary: "SUSE Bug 1179444", url: "https://bugzilla.suse.com/1179444", }, { category: "self", summary: "SUSE Bug 1179508", url: "https://bugzilla.suse.com/1179508", }, { category: "self", summary: "SUSE Bug 1179509", url: "https://bugzilla.suse.com/1179509", }, { category: "self", summary: "SUSE Bug 1179520", url: "https://bugzilla.suse.com/1179520", }, { category: "self", summary: "SUSE Bug 1179575", url: "https://bugzilla.suse.com/1179575", }, { category: "self", summary: "SUSE Bug 1179578", url: "https://bugzilla.suse.com/1179578", }, { category: "self", summary: "SUSE Bug 1179601", url: "https://bugzilla.suse.com/1179601", }, { category: "self", summary: "SUSE Bug 1179663", url: "https://bugzilla.suse.com/1179663", }, { category: "self", summary: "SUSE Bug 1179670", url: "https://bugzilla.suse.com/1179670", }, { category: "self", summary: "SUSE Bug 1179671", url: "https://bugzilla.suse.com/1179671", }, { category: "self", summary: "SUSE Bug 1179672", url: "https://bugzilla.suse.com/1179672", }, { category: "self", summary: "SUSE Bug 1179673", url: "https://bugzilla.suse.com/1179673", }, { category: "self", summary: "SUSE Bug 1179711", url: "https://bugzilla.suse.com/1179711", }, { category: "self", summary: "SUSE Bug 1179713", url: "https://bugzilla.suse.com/1179713", }, { category: "self", summary: "SUSE Bug 1179714", url: "https://bugzilla.suse.com/1179714", }, { category: "self", summary: "SUSE Bug 1179715", url: "https://bugzilla.suse.com/1179715", }, { category: "self", summary: "SUSE Bug 1179716", url: "https://bugzilla.suse.com/1179716", }, { category: "self", summary: "SUSE Bug 1179722", url: "https://bugzilla.suse.com/1179722", }, { category: "self", summary: "SUSE Bug 1179723", url: "https://bugzilla.suse.com/1179723", }, { category: "self", summary: "SUSE Bug 1179724", url: "https://bugzilla.suse.com/1179724", }, { category: "self", summary: "SUSE Bug 1179745", url: "https://bugzilla.suse.com/1179745", }, { category: "self", summary: "SUSE Bug 1179810", url: "https://bugzilla.suse.com/1179810", }, { category: "self", summary: "SUSE Bug 1179888", url: "https://bugzilla.suse.com/1179888", }, { category: "self", summary: "SUSE Bug 1179895", url: "https://bugzilla.suse.com/1179895", }, { category: "self", summary: "SUSE Bug 1179896", url: "https://bugzilla.suse.com/1179896", }, { category: "self", summary: "SUSE Bug 1179960", url: "https://bugzilla.suse.com/1179960", }, { category: "self", summary: "SUSE Bug 1179963", url: "https://bugzilla.suse.com/1179963", }, { category: "self", summary: "SUSE Bug 1180027", url: "https://bugzilla.suse.com/1180027", }, { category: "self", summary: "SUSE Bug 1180029", url: "https://bugzilla.suse.com/1180029", }, { category: "self", summary: "SUSE Bug 1180031", url: "https://bugzilla.suse.com/1180031", }, { category: "self", summary: "SUSE Bug 1180052", url: "https://bugzilla.suse.com/1180052", }, { category: "self", summary: "SUSE Bug 1180086", url: "https://bugzilla.suse.com/1180086", }, { category: "self", summary: "SUSE Bug 1180117", url: "https://bugzilla.suse.com/1180117", }, { category: "self", summary: "SUSE Bug 1180258", url: "https://bugzilla.suse.com/1180258", }, { category: "self", summary: "SUSE Bug 1180506", url: "https://bugzilla.suse.com/1180506", }, { category: "self", summary: "SUSE Bug 1180559", url: "https://bugzilla.suse.com/1180559", }, { category: "self", summary: "SUSE Bug 1180676", url: "https://bugzilla.suse.com/1180676", }, { category: "self", summary: "SUSE CVE CVE-2019-20934 page", url: "https://www.suse.com/security/cve/CVE-2019-20934/", }, { category: "self", summary: "SUSE CVE CVE-2020-0444 page", url: "https://www.suse.com/security/cve/CVE-2020-0444/", }, { category: "self", summary: "SUSE CVE CVE-2020-0465 page", url: "https://www.suse.com/security/cve/CVE-2020-0465/", }, { category: "self", summary: "SUSE CVE CVE-2020-0466 page", url: "https://www.suse.com/security/cve/CVE-2020-0466/", }, { category: "self", summary: "SUSE CVE CVE-2020-11668 page", url: "https://www.suse.com/security/cve/CVE-2020-11668/", }, { category: "self", summary: "SUSE CVE CVE-2020-25639 page", url: "https://www.suse.com/security/cve/CVE-2020-25639/", }, { category: "self", summary: "SUSE CVE CVE-2020-27068 page", url: "https://www.suse.com/security/cve/CVE-2020-27068/", }, { category: "self", summary: "SUSE CVE CVE-2020-27777 page", url: "https://www.suse.com/security/cve/CVE-2020-27777/", }, { category: "self", summary: "SUSE CVE CVE-2020-27786 page", url: "https://www.suse.com/security/cve/CVE-2020-27786/", }, { category: "self", summary: "SUSE CVE CVE-2020-27825 page", url: "https://www.suse.com/security/cve/CVE-2020-27825/", }, { category: "self", summary: "SUSE CVE CVE-2020-28374 page", url: "https://www.suse.com/security/cve/CVE-2020-28374/", }, { category: "self", summary: "SUSE CVE CVE-2020-29568 page", url: "https://www.suse.com/security/cve/CVE-2020-29568/", }, { category: "self", summary: "SUSE CVE CVE-2020-29569 page", url: "https://www.suse.com/security/cve/CVE-2020-29569/", }, { category: "self", summary: "SUSE CVE CVE-2020-29660 page", url: "https://www.suse.com/security/cve/CVE-2020-29660/", }, { category: "self", summary: "SUSE CVE CVE-2020-29661 page", url: "https://www.suse.com/security/cve/CVE-2020-29661/", }, { category: "self", summary: "SUSE CVE CVE-2020-36158 page", url: "https://www.suse.com/security/cve/CVE-2020-36158/", }, { category: "self", summary: "SUSE CVE CVE-2020-4788 page", url: "https://www.suse.com/security/cve/CVE-2020-4788/", }, ], title: "Security update for the Linux Kernel", tracking: { current_release_date: "2021-01-16T10:06:22Z", generator: { date: "2021-01-16T10:06:22Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "openSUSE-SU-2021:0075-1", initial_release_date: "2021-01-16T10:06:22Z", revision_history: [ { date: "2021-01-16T10:06:22Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "kernel-devel-4.12.14-lp151.28.91.1.noarch", product: { name: "kernel-devel-4.12.14-lp151.28.91.1.noarch", product_id: "kernel-devel-4.12.14-lp151.28.91.1.noarch", }, }, { category: "product_version", name: "kernel-docs-4.12.14-lp151.28.91.1.noarch", product: { name: "kernel-docs-4.12.14-lp151.28.91.1.noarch", product_id: "kernel-docs-4.12.14-lp151.28.91.1.noarch", }, }, { category: "product_version", name: "kernel-docs-html-4.12.14-lp151.28.91.1.noarch", product: { name: "kernel-docs-html-4.12.14-lp151.28.91.1.noarch", product_id: "kernel-docs-html-4.12.14-lp151.28.91.1.noarch", }, }, { category: "product_version", name: "kernel-macros-4.12.14-lp151.28.91.1.noarch", product: { name: "kernel-macros-4.12.14-lp151.28.91.1.noarch", product_id: "kernel-macros-4.12.14-lp151.28.91.1.noarch", }, }, { category: "product_version", name: "kernel-source-4.12.14-lp151.28.91.1.noarch", product: { name: "kernel-source-4.12.14-lp151.28.91.1.noarch", product_id: "kernel-source-4.12.14-lp151.28.91.1.noarch", }, }, { category: "product_version", name: "kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", product: { name: "kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", product_id: "kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_version", name: "kernel-debug-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-debug-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-debug-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-default-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-default-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-default-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-default-base-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-default-base-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-default-base-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-syms-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-syms-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-syms-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", }, }, { category: "product_version", name: "kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", product: { name: "kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", product_id: "kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "openSUSE Leap 15.1", product: { name: "openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "kernel-debug-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-debug-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-base-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-default-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-base-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-default-base-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-default-devel-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-devel-4.12.14-lp151.28.91.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", }, product_reference: "kernel-devel-4.12.14-lp151.28.91.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-4.12.14-lp151.28.91.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", }, product_reference: "kernel-docs-4.12.14-lp151.28.91.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-docs-html-4.12.14-lp151.28.91.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", }, product_reference: "kernel-docs-html-4.12.14-lp151.28.91.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-macros-4.12.14-lp151.28.91.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", }, product_reference: "kernel-macros-4.12.14-lp151.28.91.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-build-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-4.12.14-lp151.28.91.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", }, product_reference: "kernel-source-4.12.14-lp151.28.91.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", }, product_reference: "kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-syms-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-syms-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, { category: "default_component_of", full_product_name: { name: "kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64 as component of openSUSE Leap 15.1", product_id: "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", }, product_reference: "kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", relates_to_product_reference: "openSUSE Leap 15.1", }, ], }, vulnerabilities: [ { cve: "CVE-2019-20934", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2019-20934", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2019-20934", url: "https://www.suse.com/security/cve/CVE-2019-20934", }, { category: "external", summary: "SUSE Bug 1179663 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179663", }, { category: "external", summary: "SUSE Bug 1179666 for CVE-2019-20934", url: "https://bugzilla.suse.com/1179666", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2019-20934", }, { cve: "CVE-2020-0444", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0444", }, ], notes: [ { category: "general", text: "In audit_free_lsm_field of auditfilter.c, there is a possible bad kfree due to a logic error in audit_data_to_entry. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150693166References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0444", url: "https://www.suse.com/security/cve/CVE-2020-0444", }, { category: "external", summary: "SUSE Bug 1180027 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180027", }, { category: "external", summary: "SUSE Bug 1180028 for CVE-2020-0444", url: "https://bugzilla.suse.com/1180028", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "moderate", }, ], title: "CVE-2020-0444", }, { cve: "CVE-2020-0465", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0465", }, ], notes: [ { category: "general", text: "In various methods of hid-multitouch.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-162844689References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0465", url: "https://www.suse.com/security/cve/CVE-2020-0465", }, { category: "external", summary: "SUSE Bug 1180029 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180029", }, { category: "external", summary: "SUSE Bug 1180030 for CVE-2020-0465", url: "https://bugzilla.suse.com/1180030", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-0465", }, { cve: "CVE-2020-0466", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0466", }, ], notes: [ { category: "general", text: "In do_epoll_ctl and ep_loop_check_proc of eventpoll.c, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-147802478References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-0466", url: "https://www.suse.com/security/cve/CVE-2020-0466", }, { category: "external", summary: "SUSE Bug 1180031 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180031", }, { category: "external", summary: "SUSE Bug 1180032 for CVE-2020-0466", url: "https://bugzilla.suse.com/1180032", }, { category: "external", summary: "SUSE Bug 1199255 for CVE-2020-0466", url: "https://bugzilla.suse.com/1199255", }, { category: "external", summary: "SUSE Bug 1200084 for CVE-2020-0466", url: "https://bugzilla.suse.com/1200084", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-0466", }, { cve: "CVE-2020-11668", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-11668", }, ], notes: [ { category: "general", text: "In the Linux kernel before 5.6.1, drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors, aka CID-a246b4d54770.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-11668", url: "https://www.suse.com/security/cve/CVE-2020-11668", }, { category: "external", summary: "SUSE Bug 1168952 for CVE-2020-11668", url: "https://bugzilla.suse.com/1168952", }, { category: "external", summary: "SUSE Bug 1173942 for CVE-2020-11668", url: "https://bugzilla.suse.com/1173942", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-11668", }, { cve: "CVE-2020-25639", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-25639", }, ], notes: [ { category: "general", text: "A NULL pointer dereference flaw was found in the Linux kernel's GPU Nouveau driver functionality in versions prior to 5.12-rc1 in the way the user calls ioctl DRM_IOCTL_NOUVEAU_CHANNEL_ALLOC. This flaw allows a local user to crash the system.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-25639", url: "https://www.suse.com/security/cve/CVE-2020-25639", }, { category: "external", summary: "SUSE Bug 1176846 for CVE-2020-25639", url: "https://bugzilla.suse.com/1176846", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "moderate", }, ], title: "CVE-2020-25639", }, { cve: "CVE-2020-27068", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27068", }, ], notes: [ { category: "general", text: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27068", url: "https://www.suse.com/security/cve/CVE-2020-27068", }, { category: "external", summary: "SUSE Bug 1180086 for CVE-2020-27068", url: "https://bugzilla.suse.com/1180086", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "moderate", }, ], title: "CVE-2020-27068", }, { cve: "CVE-2020-27777", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27777", }, ], notes: [ { category: "general", text: "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27777", url: "https://www.suse.com/security/cve/CVE-2020-27777", }, { category: "external", summary: "SUSE Bug 1179107 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179107", }, { category: "external", summary: "SUSE Bug 1179419 for CVE-2020-27777", url: "https://bugzilla.suse.com/1179419", }, { category: "external", summary: "SUSE Bug 1200343 for CVE-2020-27777", url: "https://bugzilla.suse.com/1200343", }, { category: "external", summary: "SUSE Bug 1220060 for CVE-2020-27777", url: "https://bugzilla.suse.com/1220060", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.4, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "moderate", }, ], title: "CVE-2020-27777", }, { cve: "CVE-2020-27786", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27786", }, ], notes: [ { category: "general", text: "A flaw was found in the Linux kernel's implementation of MIDI, where an attacker with a local account and the permissions to issue ioctl commands to midi devices could trigger a use-after-free issue. A write to this specific memory while freed and before use causes the flow of execution to change and possibly allow for memory corruption or privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27786", url: "https://www.suse.com/security/cve/CVE-2020-27786", }, { category: "external", summary: "SUSE Bug 1179601 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179601", }, { category: "external", summary: "SUSE Bug 1179616 for CVE-2020-27786", url: "https://bugzilla.suse.com/1179616", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-27786", }, { cve: "CVE-2020-27825", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-27825", }, ], notes: [ { category: "general", text: "A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-27825", url: "https://www.suse.com/security/cve/CVE-2020-27825", }, { category: "external", summary: "SUSE Bug 1179960 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179960", }, { category: "external", summary: "SUSE Bug 1179961 for CVE-2020-27825", url: "https://bugzilla.suse.com/1179961", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-27825", }, { cve: "CVE-2020-28374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-28374", }, ], notes: [ { category: "general", text: "In drivers/target/target_core_xcopy.c in the Linux kernel before 5.10.7, insufficient identifier checking in the LIO SCSI target code can be used by remote attackers to read or write files via directory traversal in an XCOPY request, aka CID-2896c93811e3. For example, an attack can occur over a network if the attacker has access to one iSCSI LUN. The attacker gains control over file access because I/O operations are proxied via an attacker-selected backstore.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-28374", url: "https://www.suse.com/security/cve/CVE-2020-28374", }, { category: "external", summary: "SUSE Bug 1178372 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178372", }, { category: "external", summary: "SUSE Bug 1178684 for CVE-2020-28374", url: "https://bugzilla.suse.com/1178684", }, { category: "external", summary: "SUSE Bug 1180676 for CVE-2020-28374", url: "https://bugzilla.suse.com/1180676", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-28374", }, { cve: "CVE-2020-29568", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29568", }, ], notes: [ { category: "general", text: "An issue was discovered in Xen through 4.14.x. Some OSes (such as Linux, FreeBSD, and NetBSD) are processing watch events using a single thread. If the events are received faster than the thread is able to handle, they will get queued. As the queue is unbounded, a guest may be able to trigger an OOM in the backend. All systems with a FreeBSD, Linux, or NetBSD (any version) dom0 are vulnerable.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29568", url: "https://www.suse.com/security/cve/CVE-2020-29568", }, { category: "external", summary: "SUSE Bug 1179508 for CVE-2020-29568", url: "https://bugzilla.suse.com/1179508", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "moderate", }, ], title: "CVE-2020-29568", }, { cve: "CVE-2020-29569", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29569", }, ], notes: [ { category: "general", text: "An issue was discovered in the Linux kernel through 5.10.1, as used with Xen through 4.14.x. The Linux kernel PV block backend expects the kernel thread handler to reset ring->xenblkd to NULL when stopped. However, the handler may not have time to run if the frontend quickly toggles between the states connect and disconnect. As a consequence, the block backend may re-use a pointer after it was freed. A misbehaving guest can trigger a dom0 crash by continuously connecting / disconnecting a block frontend. Privilege escalation and information leaks cannot be ruled out. This only affects systems with a Linux blkback.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29569", url: "https://www.suse.com/security/cve/CVE-2020-29569", }, { category: "external", summary: "SUSE Bug 1179509 for CVE-2020-29569", url: "https://bugzilla.suse.com/1179509", }, { category: "external", summary: "SUSE Bug 1180008 for CVE-2020-29569", url: "https://bugzilla.suse.com/1180008", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-29569", }, { cve: "CVE-2020-29660", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29660", }, ], notes: [ { category: "general", text: "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29660", url: "https://www.suse.com/security/cve/CVE-2020-29660", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29660", url: "https://bugzilla.suse.com/1179877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-29660", }, { cve: "CVE-2020-29661", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-29661", }, ], notes: [ { category: "general", text: "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-29661", url: "https://www.suse.com/security/cve/CVE-2020-29661", }, { category: "external", summary: "SUSE Bug 1179745 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179745", }, { category: "external", summary: "SUSE Bug 1179877 for CVE-2020-29661", url: "https://bugzilla.suse.com/1179877", }, { category: "external", summary: "SUSE Bug 1214268 for CVE-2020-29661", url: "https://bugzilla.suse.com/1214268", }, { category: "external", summary: "SUSE Bug 1218966 for CVE-2020-29661", url: "https://bugzilla.suse.com/1218966", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-29661", }, { cve: "CVE-2020-36158", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-36158", }, ], notes: [ { category: "general", text: "mwifiex_cmd_802_11_ad_hoc_start in drivers/net/wireless/marvell/mwifiex/join.c in the Linux kernel through 5.10.4 might allow remote attackers to execute arbitrary code via a long SSID value, aka CID-5c455c5ab332.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-36158", url: "https://www.suse.com/security/cve/CVE-2020-36158", }, { category: "external", summary: "SUSE Bug 1180559 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180559", }, { category: "external", summary: "SUSE Bug 1180562 for CVE-2020-36158", url: "https://bugzilla.suse.com/1180562", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "important", }, ], title: "CVE-2020-36158", }, { cve: "CVE-2020-4788", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-4788", }, ], notes: [ { category: "general", text: "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.", title: "CVE description", }, ], product_status: { recommended: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2020-4788", url: "https://www.suse.com/security/cve/CVE-2020-4788", }, { category: "external", summary: "SUSE Bug 1177666 for CVE-2020-4788", url: "https://bugzilla.suse.com/1177666", }, { category: "external", summary: "SUSE Bug 1181158 for CVE-2020-4788", url: "https://bugzilla.suse.com/1181158", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.1, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, products: [ "openSUSE Leap 15.1:kernel-debug-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-debug-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-default-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-devel-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-docs-html-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-kvmsmall-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-kvmsmall-devel-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-macros-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-obs-build-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-obs-qa-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-source-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-source-vanilla-4.12.14-lp151.28.91.1.noarch", "openSUSE Leap 15.1:kernel-syms-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-base-4.12.14-lp151.28.91.1.x86_64", "openSUSE Leap 15.1:kernel-vanilla-devel-4.12.14-lp151.28.91.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2021-01-16T10:06:22Z", details: "moderate", }, ], title: "CVE-2020-4788", }, ], }
gsd-2020-27068
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel
Aliases
Aliases
{ GSD: { alias: "CVE-2020-27068", description: "In the nl80211_policy policy of nl80211.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not required for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-119770583", id: "GSD-2020-27068", references: [ "https://www.suse.com/security/cve/CVE-2020-27068.html", "https://linux.oracle.com/cve/CVE-2020-27068.html", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2020-27068", ], details: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", id: "GSD-2020-27068", modified: "2023-12-13T01:22:11.301727Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2020-27068", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Android", version: { version_data: [ { version_value: "Android kernel", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information disclosure", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/pixel/2022-06-01", refsource: "MISC", url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "security@android.com", ID: "CVE-2020-27068", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], }, ], }, references: { reference_data: [ { name: "https://source.android.com/security/bulletin/pixel/2022-06-01", refsource: "MISC", tags: [ "Patch", "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, ], }, }, impact: { baseMetricV2: { acInsufInfo: false, cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2023-02-09T02:12Z", publishedDate: "2020-12-15T17:15Z", }, }, }
fkie_cve-2020-27068
Vulnerability from fkie_nvd
Published
2020-12-15 17:15
Modified
2024-11-21 05:20
Severity ?
Summary
Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel
References
▼ | URL | Tags | |
---|---|---|---|
security@android.com | https://source.android.com/security/bulletin/pixel/2022-06-01 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/pixel/2022-06-01 | Patch, Vendor Advisory |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Product: AndroidVersions: Android kernelAndroid ID: A-127973231References: Upstream kernel", }, { lang: "es", value: "Producto: AndroidVersiones: Android kernelAndroid ID: A-127973231Referencias: Kernel ascendente", }, ], id: "CVE-2020-27068", lastModified: "2024-11-21T05:20:44.920", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-12-15T17:15:14.270", references: [ { source: "security@android.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://source.android.com/security/bulletin/pixel/2022-06-01", }, ], sourceIdentifier: "security@android.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.