suse-su-2020:0836-1
Vulnerability from csaf_suse
Published
2020-03-31 16:39
Modified
2020-03-31 16:39
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15-SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929). - CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931). - CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928). - CVE-2020-9383: Fixed an out-of-bounds read due to improper error condition check of FDC index (bsc#1165111). - CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285). The following non-security bugs were fixed: - ALSA: hda/realtek - Add Headset Button supported for ThinkPad X1 (bsc#1111666). - ALSA: hda/realtek - Add Headset Mic supported (bsc#1111666). - ALSA: hda/realtek - Add more codec supported Headset Button (bsc#1111666). - ALSA: hda/realtek - Apply quirk for MSI GP63, too (bsc#1111666). - ALSA: hda/realtek - Apply quirk for yet another MSI laptop (bsc#1111666). - ALSA: hda/realtek - Enable the headset of ASUS B9450FA with ALC294 (bsc#1111666). - ALSA: hda/realtek - Fix a regression for mute led on Lenovo Carbon X1 (bsc#1111666). - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master (bsc#1111666). - ALSA: usb-audio: Add boot quirk for MOTU M Series (bsc#1111666). - ALSA: usb-audio: Add clock validity quirk for Denon MC7000/MCX8000 (bsc#1111666). - ALSA: usb-audio: add implicit fb quirk for MOTU M Series (bsc#1111666). - ALSA: usb-audio: add quirks for Line6 Helix devices fw>=2.82 (bsc#1111666). - ALSA: usb-audio: Apply 48kHz fixed rate playback for Jabra Evolve 65 headset (bsc#1111666). - ALSA: usb-audio: fix Corsair Virtuoso mixer label collision (bsc#1111666). - ALSA: usb-audio: Fix UAC2/3 effect unit parsing (bsc#1111666). - ALSA: usb-audio: unlock on error in probe (bsc#1111666). - ALSA: usb-audio: Use lower hex numbers for IDs (bsc#1111666). - ALSA: usx2y: Adjust indentation in snd_usX2Y_hwdep_dsp_status (bsc#1051510). - amdgpu/gmc_v9: save/restore sdpif regs during S3 (bsc#1113956) - ASoC: dapm: Correct DAPM handling of active widgets during shutdown (bsc#1051510). - ASoC: pcm512x: Fix unbalanced regulator enable call in probe error path (bsc#1051510). - ASoC: pcm: Fix possible buffer overflow in dpcm state sysfs output (bsc#1051510). - ASoC: pcm: update FE/BE trigger order based on the command (bsc#1051510). - ASoC: topology: Fix memleak in soc_tplg_link_elems_load() (bsc#1051510). - atm: zatm: Fix empty body Clang warnings (bsc#1051510). - b43legacy: Fix -Wcast-function-type (bsc#1051510). - blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285). - blktrace: fix dereference after null check (bsc#1159285). - blktrace: fix trace mutex deadlock (bsc#1159285). - bnxt_en: Fix NTUPLE firmware command failures (bsc#1104745 ). - bnxt_en: Fix TC queue mapping (networking-stable-20_02_05). - bnxt_en: Improve device shutdown method (bsc#1104745 ). - bnxt_en: Issue PCIe FLR in kdump kernel to cleanup pending DMAs (bsc#1134090 jsc#SLE-5954). - bonding/alb: properly access headers in bond_alb_xmit() (networking-stable-20_02_09). - bpf, offload: Replace bitwise AND by logical AND in bpf_prog_offload_info_fill (bsc#1109837). - CIFS: add a debug macro that prints \\server\share for errors (bsc#1144333). - CIFS: add missing mount option to /proc/mounts (bsc#1144333). - CIFS: add new debugging macro cifs_server_dbg (bsc#1144333). - CIFS: add passthrough for smb2 setinfo (bsc#1144333). - CIFS: add SMB2_open() arg to return POSIX data (bsc#1144333). - CIFS: add smb2 POSIX info level (bsc#1144333). - CIFS: add SMB3 change notification support (bsc#1144333). - CIFS: add support for fallocate mode 0 for non-sparse files (bsc#1144333). - CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1144333). - CIFS: Add tracepoints for errors on flush or fsync (bsc#1144333). - CIFS: Adjust indentation in smb2_open_file (bsc#1144333). - CIFS: allow chmod to set mode bits using special sid (bsc#1144333). - CIFS: Avoid doing network I/O while holding cache lock (bsc#1144333). - CIFS: call wake_up(server->response_q) inside of cifs_reconnect() (bsc#1144333). - CIFS: Clean up DFS referral cache (bsc#1144333). - CIFS: create a helper function to parse the query-directory response buffer (bsc#1144333). - CIFS: do d_move in rename (bsc#1144333). - CIFS: Do not display RDMA transport on reconnect (bsc#1144333). - CIFS: do not ignore the SYNC flags in getattr (bsc#1144333). - CIFS: do not leak -EAGAIN for stat() during reconnect (bsc#1144333). - CIFS: do not use 'pre:' for MODULE_SOFTDEP (bsc#1144333). - CIFS: enable change notification for SMB2.1 dialect (bsc#1144333). - CIFS: fail i/o on soft mounts if sessionsetup errors out (bsc#1144333). - CIFS: fix a comment for the timeouts when sending echos (bsc#1144333). - CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1144333). - CIFS: fix dereference on ses before it is null checked (bsc#1144333). - CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333). - CIFS: fix mode bits from dir listing when mounted with modefromsid (bsc#1144333). - CIFS: Fix mode output in debugging statements (bsc#1144333). - CIFS: Fix mount options set in automount (bsc#1144333). - CIFS: fix NULL dereference in match_prepath (bsc#1144333). - CIFS: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1144333). - CIFS: fix potential mismatch of UNC paths (bsc#1144333). - CIFS: fix rename() by ensuring source handle opened with DELETE bit (bsc#1144333). - CIFS: Fix return value in __update_cache_entry (bsc#1144333). - CIFS: fix soft mounts hanging in the reconnect code (bsc#1144333). - CIFS: fix soft mounts hanging in the reconnect code (bsc#1144333). - CIFS: Fix task struct use-after-free on reconnect (bsc#1144333). - CIFS: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1144333). - CIFS: get mode bits from special sid on stat (bsc#1144333). - CIFS: Get rid of kstrdup_const()'d paths (bsc#1144333). - CIFS: handle prefix paths in reconnect (bsc#1144333). - CIFS: Introduce helpers for finding TCP connection (bsc#1144333). - CIFS: log warning message (once) if out of disk space (bsc#1144333). - CIFS: make sure we do not overflow the max EA buffer size (bsc#1144333). - CIFS: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1144333). - CIFS: Merge is_path_valid() into get_normalized_path() (bsc#1144333). - CIFS: modefromsid: make room for 4 ACE (bsc#1144333). - CIFS: modefromsid: write mode ACE first (bsc#1144333). - CIFS: Optimize readdir on reparse points (bsc#1144333). - CIFS: plumb smb2 POSIX dir enumeration (bsc#1144333). - CIFS: potential unintitliazed error code in cifs_getattr() (bsc#1144333). - CIFS: prepare SMB2_query_directory to be used with compounding (bsc#1144333). - CIFS: print warning once if mounting with vers=1.0 (bsc#1144333). - CIFS: refactor cifs_get_inode_info() (bsc#1144333). - CIFS: remove redundant assignment to pointer pneg_ctxt (bsc#1144333). - CIFS: remove redundant assignment to variable rc (bsc#1144333). - CIFS: remove set but not used variables (bsc#1144333). - CIFS: remove set but not used variable 'server' (bsc#1144333). - CIFS: remove unused variable (bsc#1144333). - CIFS: remove unused variable 'sid_user' (bsc#1144333). - CIFS: rename a variable in SendReceive() (bsc#1144333). - CIFS: rename posix create rsp (bsc#1144333). - CIFS: replace various strncpy with strscpy and similar (bsc#1144333). - CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1144333). - CIFS: set correct max-buffer-size for smb2_ioctl_init() (bsc#1144333). - CIFS: smbd: Add messages on RDMA session destroy and reconnection (bsc#1144333). - CIFS: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1144333). - CIFS: smbd: Only queue work for error recovery on memory registration (bsc#1144333). - CIFS: smbd: Return -EAGAIN when transport is reconnecting (bsc#1144333). - CIFS: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1144333). - CIFS: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1144333). - CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1144333). - CIFS: use compounding for open and first query-dir for readdir() (bsc#1144333). - CIFS: Use #define in cifs_dbg (bsc#1144333). - CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1144333). - CIFS: use mod_delayed_work() for server->reconnect if already queued (bsc#1144333). - CIFS: use PTR_ERR_OR_ZERO() to simplify code (bsc#1144333). - cls_rsvp: fix rsvp_policy (networking-stable-20_02_05). - core: Do not skip generic XDP program execution for cloned SKBs (bsc#1109837). - cpufreq: powernv: Fix unsafe notifiers (bsc#1065729). - cpufreq: powernv: Fix use-after-free (bsc#1065729). - crypto: pcrypt - Fix user-after-free on module unload (git-fixes). - devlink: report 0 after hitting end in region read (bsc#1109837). - dmaengine: coh901318: Fix a double lock bug in dma_tc_handle() (bsc#1051510). - driver core: platform: fix u32 greater or equal to zero comparison (bsc#1051510). - driver core: platform: Prevent resouce overflow from causing infinite loops (bsc#1051510). - driver core: Print device when resources present in really_probe() (bsc#1051510). - drivers/md/raid5.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003). - drivers/md/raid5-ppl.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003). - drm/amd/dm/mst: Ignore payload update failures (bsc#1112178) - drm/amdkfd: fix a use after free race with mmu_notifer unregister (bsc#1114279) - drm: atmel-hlcdc: enable clock before configuring timing engine (bsc#1114279) - drm/etnaviv: fix dumping of iommuv2 (bsc#1114279) - drm/gma500: Fixup fbdev stolen size usage evaluation (bsc#1051510). - drm/i915/gvt: Fix orphan vgpu dmabuf_objs' lifetime (git-fixes). - drm/i915/gvt: Fix unnecessary schedule timer when no vGPU exits (git-fixes). - drm/i915/gvt: Separate display reset from ALL_ENGINES reset (bsc#1114279) - drm/i915: Program MBUS with rmw during initialization (git-fixes). - drm/i915/selftests: Fix return in assert_mmap_offset() (bsc#1114279) - drm/i915/userptr: fix size calculation (bsc#1114279) - drm/i915/userptr: Try to acquire the page lock around (bsc#1114279) - drm/i915: Wean off drm_pci_alloc/drm_pci_free (bsc#1114279) - drm/mediatek: Add gamma property according to hardware capability (bsc#1114279) - drm/mediatek: disable all the planes in atomic_disable (bsc#1114279) - drm/mediatek: handle events when enabling/disabling crtc (bsc#1051510). - drm/mipi_dbi: Fix off-by-one bugs in mipi_dbi_blank() (bsc#1114279) - drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1114279) - drm/nouveau/disp/nv50-: prevent oops when no channel method map provided (bsc#1051510). - drm/nouveau/gr/gk20a,gm200-: add terminators to method lists read from fw (bsc#1051510). - drm/nouveau/kms/gv100-: Re-set LUT after clearing for modesets (git-fixes). - drm: rcar-du: Recognize 'renesas,vsps' in addition to 'vsps' (bsc#1114279) - drm: remove the newline for CRC source name (bsc#1051510). - EDAC/mc: Fix use-after-free and memleaks during device removal (bsc#1114279). - Enabled the following two patches in series.conf, and refresh the KABI patch due to previous md commit (bsc#1119680) - ethtool: Factored out similar ethtool link settings for virtual devices to core (bsc#1136157 ltc#177197). - fcntl: fix typo in RWH_WRITE_LIFE_NOT_SET r/w hint name (bsc#1166003). - firmware: imx: misc: Align imx sc msg structs to 4 (git-fixes). - firmware: imx: scu: Ensure sequential TX (git-fixes). - firmware: imx: scu-pd: Align imx sc msg structs to 4 (git-fixes). - Fixed memory leak in large read decrypt offload (bsc#1144333). - Fixed some regressions (bsc#1165527 ltc#184149). - fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1144333). - fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1144333). - fs: cifs: Initialize filesystem timestamp ranges (bsc#1144333). - fs: cifs: mute -Wunused-const-variable message (bsc#1144333). - fs/cifs/sess.c: Remove set but not used variable 'capabilities' (bsc#1144333). - fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1144333). - fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1144333). - fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985). - gtp: make sure only SOCK_DGRAM UDP sockets are accepted (networking-stable-20_01_27). - gtp: use __GFP_NOWARN to avoid memalloc warning (networking-stable-20_02_05). - HID: core: fix off-by-one memset in hid_report_raw_event() (bsc#1051510). - HID: hiddev: Fix race in in hiddev_disconnect() (git-fixes). - hv_netvsc: Fix memory leak when removing rndis device (networking-stable-20_01_20). - hwmon: (adt7462) Fix an error return in ADT7462_REG_VOLT() (bsc#1051510). - IB/hfi1: Close window for pq and request coliding (bsc#1060463 ). - ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551). - ibmvnic: Do not process device remove during device reset (bsc#1065729). - ibmvnic: Warn unknown speed message only when carrier is present (bsc#1065729). - Input: edt-ft5x06 - work around first register access error (bsc#1051510). - Input: synaptics - enable SMBus on ThinkPad L470 (bsc#1051510). - Input: synaptics - remove the LEN0049 dmi id from topbuttonpad list (bsc#1051510). - Input: synaptics - switch T470s to RMI4 by default (bsc#1051510). - iommu/amd: Check feature support bit before accessing MSI capability registers (bsc#1166101). - iommu/amd: Only support x2APIC with IVHD type 11h/40h (bsc#1166102). - iommu/amd: Remap the IOMMU device table with the memory encryption mask for kdump (bsc#1141895). - iommu/dma: Fix MSI reservation allocation (bsc#1166730). - iommu/vt-d: dmar: replace WARN_TAINT with pr_warn + add_taint (bsc#1166731). - iommu/vt-d: Fix a bug in intel_iommu_iova_to_phys() for huge page (bsc#1166732). - iommu/vt-d: Fix compile warning from intel-svm.h (bsc#1166103). - iommu/vt-d: Fix the wrong printing in RHSA parsing (bsc#1166733). - iommu/vt-d: Ignore devices with out-of-spec domain number (bsc#1166734). - iommu/vt-d: quirk_ioat_snb_local_iommu: replace WARN_TAINT with pr_warn + add_taint (bsc#1166735). - ipv4: ensure rcu_read_lock() in cipso_v4_error() (git-fixes). - ipv6: restrict IPV6_ADDRFORM operation (bsc#1109837). - iwlegacy: Fix -Wcast-function-type (bsc#1051510). - iwlwifi: mvm: Do not require PHY_SKU NVM section for 3168 devices (bsc#1166632). - iwlwifi: mvm: Fix thermal zone registration (bsc#1051510). - kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled (bsc#1141895). - kernel/module.c: Only return -EEXIST for modules that have finished loading (bsc#1165488). - kernel/module.c: wakeup processes in module_wq on module unload (bsc#1165488). - kexec: Allocate decrypted control pages for kdump if SME is enabled (bsc#1141895). - KVM: arm64: Store vcpu on the stack during __guest_enter() (bsc#1133021). - KVM: s390: do not clobber registers during guest reset/store status (bsc#1133021). - KVM: s390: ENOTSUPP -> EOPNOTSUPP fixups (bsc#1133021). - KVM: VMX: check descriptor table exits on instruction emulation (bsc#1166104). - l2tp: Allow duplicate session creation with UDP (networking-stable-20_02_05). - libnvdimm/pfn_dev: Do not clear device memmap area during generic namespace probe (bsc#1165929 bsc#1165950). - libnvdimm/pfn: fix fsdax-mode namespace info-block zero-fields (bsc#1165929). - libnvdimm: remove redundant __func__ in dev_dbg (bsc#1165929). - lib/raid6: add missing include for raid6test (bsc#1166003). - lib/raid6: add option to skip algo benchmarking (bsc#1166003). - lib/raid6: avoid __attribute_const__ redefinition (bsc#1166003). - md: add __acquires/__releases annotations to handle_active_stripes (bsc#1166003). - md: add __acquires/__releases annotations to (un)lock_two_stripes (bsc#1166003). - md: add a missing endianness conversion in check_sb_changes (bsc#1166003). - md: add bitmap_abort label in md_run (bsc#1166003). - md: add feature flag MD_FEATURE_RAID0_LAYOUT (bsc#1166003). - md: allow last device to be forcibly removed from RAID1/RAID10 (bsc#1166003). - md: avoid invalid memory access for array sb->dev_roles (bsc#1166003). - md/bitmap: avoid race window between md_bitmap_resize and bitmap_file_clear_bit (bsc#1166003). - md-bitmap: create and destroy wb_info_pool with the change of backlog (bsc#1166003). - md-bitmap: create and destroy wb_info_pool with the change of bitmap (bsc#1166003). - md-bitmap: small cleanups (bsc#1166003). - md/bitmap: use mddev_suspend/resume instead of ->quiesce() (bsc#1166003). - md-cluster/bitmap: do not call md_bitmap_sync_with_cluster during reshaping stage (bsc#1166003). - md-cluster: introduce resync_info_get interface for sanity check (bsc#1166003). - md-cluster/raid10: call update_size in md_reap_sync_thread (bsc#1166003). - md-cluster/raid10: do not call remove_and_add_spares during reshaping stage (bsc#1166003). - md-cluster/raid10: resize all the bitmaps before start reshape (bsc#1166003). - md-cluster/raid10: support add disk under grow mode (bsc#1166003). - md-cluster: remove suspend_info (bsc#1166003). - md-cluster: send BITMAP_NEEDS_SYNC message if reshaping is interrupted (bsc#1166003). - md: convert to kvmalloc (bsc#1166003). - md: do not call spare_active in md_reap_sync_thread if all member devices can't work (bsc#1166003). - md: do not set In_sync if array is frozen (bsc#1166003). - md: fix a typo s/creat/create (bsc#1166003). - md: fix for divide error in status_resync (bsc#1166003). - md: fix spelling typo and add necessary space (bsc#1166003). - md: introduce mddev_create/destroy_wb_pool for the change of member device (bsc#1166003). - md-linear: use struct_size() in kzalloc() (bsc#1166003). - md: Make bio_alloc_mddev use bio_alloc_bioset (bsc#1166003). - md: make sure desc_nr less than MD_SB_DISKS (bsc#1166003). - md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1166003). - md: no longer compare spare disk superblock events in super_load (bsc#1166003). - md/raid0: Fix an error message in raid0_make_request() (bsc#1166003). - md raid0/linear: Mark array as 'broken' and fail BIOs if a member is gone (bsc#1166003). - md/raid10: end bio when the device faulty (bsc#1166003). - md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1166003). - md/raid10: prevent access of uninitialized resync_pages offset (bsc#1166003). - md/raid10: read balance chooses idlest disk for SSD (bsc#1166003). - md: raid10: Use struct_size() in kmalloc() (bsc#1166003). - md/raid1: avoid soft lockup under high load (bsc#1166003). - md: raid1: check rdev before reference in raid1_sync_request func (bsc#1166003). - md/raid1: end bio when the device faulty (bsc#1166003). - md/raid1: fail run raid1 array when active disk less than one (bsc#1166003). - md/raid1: Fix a warning message in remove_wb() (bsc#1166003). - md/raid1: fix potential data inconsistency issue with write behind device (bsc#1166003). - md/raid1: get rid of extra blank line and space (bsc#1166003). - md/raid5: use bio_end_sector to calculate last_sector (bsc#1166003). - md/raid6: fix algorithm choice under larger PAGE_SIZE (bsc#1166003). - md: remove set but not used variable 'bi_rdev' (bsc#1166003). - md: rename wb stuffs (bsc#1166003). - md: return -ENODEV if rdev has no mddev assigned (bsc#1166003). - md: use correct type in super_1_load (bsc#1166003). - md: use correct type in super_1_sync (bsc#1166003). - md: use correct types in md_bitmap_print_sb (bsc#1166003). - media: uvcvideo: Refactor teardown of uvc on USB disconnect (bsc#1164507). - mlxsw: spectrum_qdisc: Include MC TCs in Qdisc counters (bsc#1112374). - mlxsw: spectrum: Wipe xstats.backlog of down ports (bsc#1112374). - net: cxgb3_main: Add CAP_NET_ADMIN check to CHELSIO_GET_MEM (networking-stable-20_01_27). - net: dsa: mv88e6xxx: Preserve priority when setting CPU port (networking-stable-20_01_11). - net: dsa: tag_qca: fix doubled Tx statistics (networking-stable-20_01_20). - net/ethtool: Introduce link_ksettings API for virtual network devices (bsc#1136157 ltc#177197). - net: Fix Tx hash bound checking (bsc#1109837). - net: hns3: fix a copying IPv6 address error in hclge_fd_get_flow_tuples() (bsc#1104353). - net: hns: fix soft lockup when there is not enough memory (networking-stable-20_01_20). - net: hsr: fix possible NULL deref in hsr_handle_frame() (networking-stable-20_02_05). - net: ip6_gre: fix moving ip6gre between namespaces (networking-stable-20_01_27). - net, ip6_tunnel: fix namespaces move (networking-stable-20_01_27). - net, ip_tunnel: fix namespaces move (networking-stable-20_01_27). - net: macb: Limit maximum GEM TX length in TSO (networking-stable-20_02_09). - net: macb: Remove unnecessary alignment check for TSO (networking-stable-20_02_09). - net/mlx5: Fix lowest FDB pool size (bsc#1103990). - net/mlx5: IPsec, Fix esp modify function attribute (bsc#1103990 ). - net/mlx5: IPsec, fix memory leak at mlx5_fpga_ipsec_delete_sa_ctx (bsc#1103990). - net/mlx5: Update the list of the PCI supported devices (bsc#1127611). - net/mlxfw: Verify FSM error code translation does not exceed array size (bsc#1051858). - net: mvneta: move rx_dropped and rx_errors in per-cpu stats (networking-stable-20_02_09). - net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link() (networking-stable-20_01_27). - net_sched: ematch: reject invalid TCF_EM_SIMPLE (networking-stable-20_01_30). - net_sched: fix an OOB access in cls_tcindex (networking-stable-20_02_05). - net_sched: fix a resource leak in tcindex_set_parms() (networking-stable-20_02_09). - net_sched: fix datalen for ematch (networking-stable-20_01_27). - net: sch_prio: When ungrafting, replace with FIFO (networking-stable-20_01_11). - net/smc: add fallback check to connect() (git-fixes). - net/smc: fix cleanup for linkgroup setup failures (git-fixes). - net/smc: no peer ID in CLC decline for SMCD (git-fixes). - net/smc: transfer fasync_list in case of fallback (git-fixes). - net: stmmac: dwmac-sunxi: Allow all RGMII modes (networking-stable-20_01_11). - net-sysfs: Fix reference count leak (networking-stable-20_01_27). - net: systemport: Avoid RBUF stuck in Wake-on-LAN mode (networking-stable-20_02_09). - net/tls: fix async operation (bsc#1109837). - net/tls: free the record on encryption error (bsc#1109837). - net/tls: take into account that bpf_exec_tx_verdict() may free the record (bsc#1109837). - net: usb: lan78xx: Add .ndo_features_check (networking-stable-20_01_27). - net: usb: lan78xx: fix possible skb leak (networking-stable-20_01_11). - net/wan/fsl_ucc_hdlc: fix out of bounds write on array utdm_info (networking-stable-20_01_20). - NFC: pn544: Fix a typo in a debug message (bsc#1051510). - NFC: port100: Convert cpu_to_le16(le16_to_cpu(E1) + E2) to use le16_add_cpu() (bsc#1051510). - nvme: Fix parsing of ANA log page (bsc#1166658). - nvme: resync include/linux/nvme.h with nvmecli (bsc#1156510). - nvme: Translate more status codes to blk_status_t (bsc#1156510). - orinoco: avoid assertion in case of NULL pointer (bsc#1051510). - padata: always acquire cpu_hotplug_lock before pinst->lock (git-fixes). - PCI/AER: Clear device status bits during ERR_COR handling (bsc#1161561). - PCI/AER: Clear device status bits during ERR_FATAL and ERR_NONFATAL (bsc#1161561). - PCI/AER: Clear only ERR_FATAL status bits during fatal recovery (bsc#1161561). - PCI/AER: Clear only ERR_NONFATAL bits during non-fatal recovery (bsc#1161561). - PCI/AER: Do not clear AER bits if error handling is Firmware-First (bsc#1161561). - PCI/AER: Do not read upstream ports below fatal errors (bsc#1161561). - PCI/AER: Factor out ERR_NONFATAL status bit clearing (bsc#1161561). - PCI/AER: Take reference on error devices (bsc#1161561). - PCI/ERR: Run error recovery callbacks for all affected devices (bsc#1161561). - PCI/ERR: Use slot reset if available (bsc#1161561). - pinctrl: baytrail: Do not clear IRQ flags on direct-irq enabled pins (bsc#1051510). - pinctrl: imx: scu: Align imx sc msg structs to 4 (git-fixes). - pinctrl: sh-pfc: sh7264: Fix CAN function GPIOs (bsc#1051510). - pinctrl: sh-pfc: sh7269: Fix CAN function GPIOs (bsc#1051510). - pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM (networking-stable-20_01_11). - platform/mellanox: fix potential deadlock in the tmfifo driver (bsc#1136333 jsc#SLE-4994). - powerpc: fix hardware PMU exception bug on PowerVM compatibility mode systems (bsc#1056686). - powerpc/pseries: Avoid NULL pointer dereference when drmem is unavailable (bsc#1160659). - powerpc/pseries: fix of_read_drc_info_cell() to point at next record (bsc#1165980 ltc#183834). - powerpc/pseries: group lmb operation and memblock's (bsc#1165404 ltc#183498). - powerpc/pseries/memory-hotplug: Only update DT once per memory DLPAR request (bsc#1165404 ltc#183498). - powerpc/pseries: update device tree before ejecting hotplug uevents (bsc#1165404 ltc#183498). - powerpc/smp: Use nid as fallback for package_id (bsc#1165813 ltc#184091). - ptr_ring: add include of linux/mm.h (bsc#1109837). - qmi_wwan: re-add DW5821e pre-production variant (bsc#1051510). - raid10: refactor common wait code from regular read/write request (bsc#1166003). - raid1: factor out a common routine to handle the completion of sync write (bsc#1166003). - raid1: simplify raid1_error function (bsc#1166003). - raid1: use an int as the return value of raise_barrier() (bsc#1166003). - raid5: block failing device if raid will be failed (bsc#1166003). - raid5: do not increment read_errors on EILSEQ return (bsc#1166003). - raid5: do not set STRIPE_HANDLE to stripe which is in batch list (bsc#1166003). - raid5 improve too many read errors msg by adding limits (bsc#1166003). - raid5: need to set STRIPE_HANDLE for batch head (bsc#1166003). - raid5: remove STRIPE_OPS_REQ_PENDING (bsc#1166003). - raid5: remove worker_cnt_per_group argument from alloc_thread_groups (bsc#1166003). - raid5: set write hint for PPL (bsc#1166003). - raid5: use bio_end_sector in r5_next_bio (bsc#1166003). - raid6/test: fix a compilation error (bsc#1166003). - raid6/test: fix a compilation warning (bsc#1166003). - RDMA/cma: Fix unbalanced cm_id reference count during address resolve (bsc#1103992). - RDMA/hfi1: Fix memory leak in _dev_comp_vect_mappings_create (bsc#1114685). - RDMA/uverbs: Verify MR access flags (bsc#1103992). - remoteproc: Initialize rproc_class before use (bsc#1051510). - Revert 'HID: add NOGET quirk for Eaton Ellipse MAX UPS' (git-fixes). - rtlwifi: rtl_pci: Fix -Wcast-function-type (bsc#1051510). - rxrpc: Fix insufficient receive notification generation (networking-stable-20_02_05). - s390/pci: Fix unexpected write combine on resource (git-fixes). - s390/uv: Fix handling of length extensions (git-fixes). - scsi: fnic: do not queue commands during fwreset (bsc#1146539). - scsi: ibmvfc: Add failed PRLI to cmd_status lookup array (bsc#1161951 ltc#183551). - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551). - scsi: ibmvfc: Byte swap status and error codes when logging (bsc#1161951 ltc#183551). - scsi: ibmvfc: Clean up transport events (bsc#1161951 ltc#183551). - scsi: ibmvfc: constify dev_pm_ops structures (bsc#1161951 ltc#183551). - scsi: ibmvfc: Do not call fc_block_scsi_eh() on host reset (bsc#1161951 ltc#183551). - scsi: ibmvfc: ibmvscsi: ibmvscsi_tgt: constify vio_device_id (bsc#1161951 ltc#183551). - scsi: ibmvfc: Mark expected switch fall-throughs (bsc#1161951 ltc#183551). - scsi: ibmvfc: Remove 'failed' from logged errors (bsc#1161951 ltc#183551). - scsi: ibmvfc: Remove unneeded semicolons (bsc#1161951 ltc#183551). - scsi: ibmvscsi: change strncpy+truncation to strlcpy (bsc#1161951 ltc#183551). - scsi: ibmvscsi: constify dev_pm_ops structures (bsc#1161951 ltc#183551). - scsi: ibmvscsi: Do not use rc uninitialized in ibmvscsi_do_work (bsc#1161951 ltc#183551). - scsi: ibmvscsi: fix tripping of blk_mq_run_hw_queue WARN_ON (bsc#1161951 ltc#183551). - scsi: ibmvscsi: Improve strings handling (bsc#1161951 ltc#183551). - scsi: ibmvscsi: redo driver work thread to use enum action states (bsc#1161951 ltc#183551). - scsi: ibmvscsi: Wire up host_reset() in the driver's scsi_host_template (bsc#1161951 ltc#183551). - scsi: qla2xxx: Add 16.0GT for PCI String (bsc#1157424). - scsi: qla2xxx: Add beacon LED config sysfs interface (bsc#1157424). - scsi: qla2xxx: Add changes in preparation for vendor extended FDMI/RDP (bsc#1157424). - scsi: qla2xxx: Add deferred queue for processing ABTS and RDP (bsc#1157424). - scsi: qla2xxx: Add endianizer macro calls to fc host stats (bsc#1157424). - scsi: qla2xxx: Add fixes for mailbox command (bsc#1157424). - scsi: qla2xxx: add more FW debug information (bsc#1157424). - scsi: qla2xxx: Add ql2xrdpenable module parameter for RDP (bsc#1157424). - scsi: qla2xxx: Add sysfs node for D-Port Diagnostics AEN data (bsc#1157424). - scsi: qla2xxx: Add vendor extended FDMI commands (bsc#1157424). - scsi: qla2xxx: Add vendor extended RDP additions and amendments (bsc#1157424). - scsi: qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options (bsc#1157424). - scsi: qla2xxx: Check locking assumptions at runtime in qla2x00_abort_srb() (bsc#1157424). - scsi: qla2xxx: Cleanup ELS/PUREX iocb fields (bsc#1157424). - scsi: qla2xxx: Convert MAKE_HANDLE() from a define into an inline function (bsc#1157424). - scsi: qla2xxx: Correction to selection of loopback/echo test (bsc#1157424). - scsi: qla2xxx: Display message for FCE enabled (bsc#1157424). - scsi: qla2xxx: Fix control flags for login/logout IOCB (bsc#1157424). - scsi: qla2xxx: Fix FCP-SCSI FC4 flag passing error (bsc#1157424). - scsi: qla2xxx: fix FW resource count values (bsc#1157424). - scsi: qla2xxx: Fix NPIV instantiation after FW dump (bsc#1157424). - scsi: qla2xxx: Fix qla2x00_echo_test() based on ISP type (bsc#1157424). - scsi: qla2xxx: Fix RDP respond data format (bsc#1157424). - scsi: qla2xxx: Fix RDP response size (bsc#1157424). - scsi: qla2xxx: Fix sparse warning reported by kbuild bot (bsc#1157424). - scsi: qla2xxx: Fix sparse warnings triggered by the PCI state checking code (bsc#1157424). - scsi: qla2xxx: Force semaphore on flash validation failure (bsc#1157424). - scsi: qla2xxx: Handle cases for limiting RDP response payload length (bsc#1157424). - scsi: qla2xxx: Handle NVME status iocb correctly (bsc#1157424). - scsi: qla2xxx: Improved secure flash support messages (bsc#1157424). - scsi: qla2xxx: Move free of fcport out of interrupt context (bsc#1157424). - scsi: qla2xxx: Print portname for logging in qla24xx_logio_entry() (bsc#1157424). - scsi: qla2xxx: Remove restriction of FC T10-PI and FC-NVMe (bsc#1157424). - scsi: qla2xxx: Return appropriate failure through BSG Interface (bsc#1157424). - scsi: qla2xxx: Save rscn_gen for new fcport (bsc#1157424). - scsi: qla2xxx: Serialize fc_port alloc in N2N (bsc#1157424). - scsi: qla2xxx: Set Nport ID for N2N (bsc#1157424). - scsi: qla2xxx: Show correct port speed capabilities for RDP command (bsc#1157424). - scsi: qla2xxx: Simplify the code for aborting SCSI commands (bsc#1157424). - scsi: qla2xxx: Suppress endianness complaints in qla2x00_configure_local_loop() (bsc#1157424). - scsi: qla2xxx: Update BPM enablement semantics (bsc#1157424). - scsi: qla2xxx: Update driver version to 10.01.00.24-k (bsc#1157424). - scsi: qla2xxx: Update driver version to 10.01.00.25-k (bsc#1157424). - scsi: qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs (bsc#1157424). - scsi: qla2xxx: Use correct ISP28xx active FW region (bsc#1157424). - scsi: qla2xxx: Use endian macros to assign static fields in fwdump header (bsc#1157424). - scsi: qla2xxx: Use FC generic update firmware options routine for ISP27xx (bsc#1157424). - scsi: qla2xxx: Use QLA_FW_STOPPED macro to propagate flag (bsc#1157424). - scsi: tcm_qla2xxx: Make qlt_alloc_qfull_cmd() set cmd->se_cmd.map_tag (bsc#1157424). - sctp: free cmd->obj.chunk for the unprocessed SCTP_CMD_REPLY (networking-stable-20_01_11). - smb3: add debug messages for closing unmatched open (bsc#1144333). - smb3: Add defines for new information level, FileIdInformation (bsc#1144333). - smb3: add dynamic tracepoints for flush and close (bsc#1144333). - smb3: add missing flag definitions (bsc#1144333). - smb3: Add missing reparse tags (bsc#1144333). - smb3: add missing worker function for SMB3 change notify (bsc#1144333). - smb3: add mount option to allow forced caching of read only share (bsc#1144333). - smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1144333). - smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1144333). - smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1144333). - smb3: allow decryption keys to be dumped by admin for debugging (bsc#1144333). - smb3: allow disabling requesting leases (bsc#1144333). - smb3: allow parallelizing decryption of reads (bsc#1144333). - smb3: allow skipping signature verification for perf sensitive configurations (bsc#1144333). - smb3: Backup intent flag missing from some more ops (bsc#1144333). - smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1144333). - smb3: display max smb3 requests in flight at any one time (bsc#1144333). - smb3: dump in_send and num_waiters stats counters by default (bsc#1144333). - smb3: enable offload of decryption of large reads via mount option (bsc#1144333). - smb3: fix default permissions on new files when mounting with modefromsid (bsc#1144333). - smb3: fix mode passed in on create for modetosid mount option (bsc#1144333). - smb3: fix performance regression with setting mtime (bsc#1144333). - smb3: fix potential null dereference in decrypt offload (bsc#1144333). - smb3: fix problem with null cifs super block with previous patch (bsc#1144333). - smb3: Fix regression in time handling (bsc#1144333). - smb3: improve check for when we send the security descriptor context on create (bsc#1144333). - smb3: log warning if CSC policy conflicts with cache mount option (bsc#1144333). - smb3: missing ACL related flags (bsc#1144333). - smb3: only offload decryption of read responses if multiple requests (bsc#1144333). - smb3: pass mode bits into create calls (bsc#1144333). - smb3: print warning once if posix context returned on open (bsc#1144333). - smb3: query attributes on file close (bsc#1144333). - smb3: remove noisy debug message and minor cleanup (bsc#1144333). - smb3: remove unused flag passed into close functions (bsc#1144333). - staging: rtl8188eu: Fix potential overuse of kernel memory (bsc#1051510). - staging: rtl8188eu: Fix potential security hole (bsc#1051510). - staging: rtl8723bs: Fix potential overuse of kernel memory (bsc#1051510). - staging: rtl8723bs: Fix potential security hole (bsc#1051510). - SUNRPC: Fix svcauth_gss_proxy_init() (bsc#1103992). - tcp_bbr: improve arithmetic division in bbr_update_bw() (networking-stable-20_01_27). - tcp: clear tp->data_segs{in|out} in tcp_disconnect() (networking-stable-20_02_05). - tcp: clear tp->delivered in tcp_disconnect() (networking-stable-20_02_05). - tcp: clear tp->segs_{in|out} in tcp_disconnect() (networking-stable-20_02_05). - tcp: clear tp->total_retrans in tcp_disconnect() (networking-stable-20_02_05). - tcp: fix marked lost packets not being retransmitted (networking-stable-20_01_20). - tcp: fix 'old stuff' D-SACK causing SACK to be treated as D-SACK (networking-stable-20_01_11). - thunderbolt: Prevent crash if non-active NVMem file is read (git-fixes). - tick: broadcast-hrtimer: Fix a race in bc_set_next (bsc#1044231). - tools lib traceevent: Do not free tep->cmdlines in add_new_comm() on failure (git-fixes). - tools: Update include/uapi/linux/fcntl.h copy from the kernel (bsc#1166003). - ttyprintk: fix a potential deadlock in interrupt context issue (git-fixes). - tun: add mutex_unlock() call and napi.skb clearing in tun_get_user() (bsc#1109837). - Updated block layer, timers and md code for SLE15-SP1 kernel (bsc#1111974). - Updated 'drm/i915: Wean off drm_pci_alloc/drm_pci_free' (bsc#1114279) - USB: core: add endpoint-blacklist quirk (git-fixes). - USBip: Fix uninitialized symbol 'nents' in stub_recv_cmd_submit() (git-fixes). - USB: quirks: blacklist duplicate ep on Sound Devices USBPre2 (git-fixes). - uvcvideo: Refactor teardown of uvc on USB disconnect (https://patchwork.kernel.org/patch/9683663/) (bsc#1164507) - vgacon: Fix a UAF in vgacon_invert_region (bsc#1114279) - virtio-blk: fix hw_queue stopped on arbitrary error (git-fixes). - vlan: fix memory leak in vlan_dev_set_egress_priority (networking-stable-20_01_11). - vlan: vlan_changelink() should propagate errors (networking-stable-20_01_11). - vxlan: fix tos value before xmit (networking-stable-20_01_11). - x86/cpu/amd: Enable the fixed Instructions Retired counter IRPERF (bsc#1114279). - x86/ioremap: Add an ioremap_encrypted() helper (bsc#1141895). - x86/kdump: Export the SME mask to vmcoreinfo (bsc#1141895). - x86/mce/amd: Fix kobject lifetime (bsc#1114279). - x86/mce/amd: Publish the bank pointer only after setup has succeeded (bsc#1114279). - x86/mm: Split vmalloc_sync_all() (bsc#1165741). - xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873). - xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984). - xhci: fix runtime pm enabling for quirky Intel hosts (bsc#1051510). - xhci: Force Maximum Packet size for Full-speed bulk devices to valid range (bsc#1051510).
Patchnames
SUSE-2020-836,SUSE-SLE-Module-Basesystem-15-SP1-2020-836,SUSE-SLE-Module-Development-Tools-15-SP1-2020-836,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-836,SUSE-SLE-Module-Legacy-15-SP1-2020-836,SUSE-SLE-Module-Live-Patching-15-SP1-2020-836,SUSE-SLE-Product-HA-15-SP1-2020-836,SUSE-SLE-Product-WE-15-SP1-2020-836
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15-SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2020-8647: Fixed a use-after-free in the vc_do_resize function in drivers/tty/vt/vt.c (bsc#1162929).\n- CVE-2020-8649: Fixed a use-after-free in the vgacon_invert_region function in drivers/video/console/vgacon.c (bsc#1162931).\n- CVE-2020-8648: Fixed a use-after-free in the n_tty_receive_buf_common function in drivers/tty/n_tty.c (bsc#1162928).\n- CVE-2020-9383: Fixed an out-of-bounds read due to improper error condition check of FDC index (bsc#1165111).\n- CVE-2019-19768: Fixed a use-after-free in the __blk_add_trace function in kernel/trace/blktrace.c (bnc#1159285).\n\nThe following non-security bugs were fixed:\n\n- ALSA: hda/realtek - Add Headset Button supported for ThinkPad X1 (bsc#1111666).\n- ALSA: hda/realtek - Add Headset Mic supported (bsc#1111666).\n- ALSA: hda/realtek - Add more codec supported Headset Button (bsc#1111666).\n- ALSA: hda/realtek - Apply quirk for MSI GP63, too (bsc#1111666).\n- ALSA: hda/realtek - Apply quirk for yet another MSI laptop (bsc#1111666).\n- ALSA: hda/realtek - Enable the headset of ASUS B9450FA with ALC294 (bsc#1111666).\n- ALSA: hda/realtek - Fix a regression for mute led on Lenovo Carbon X1 (bsc#1111666).\n- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master (bsc#1111666).\n- ALSA: usb-audio: Add boot quirk for MOTU M Series (bsc#1111666).\n- ALSA: usb-audio: Add clock validity quirk for Denon MC7000/MCX8000 (bsc#1111666).\n- ALSA: usb-audio: add implicit fb quirk for MOTU M Series (bsc#1111666).\n- ALSA: usb-audio: add quirks for Line6 Helix devices fw\u003e=2.82 (bsc#1111666).\n- ALSA: usb-audio: Apply 48kHz fixed rate playback for Jabra Evolve 65 headset (bsc#1111666).\n- ALSA: usb-audio: fix Corsair Virtuoso mixer label collision (bsc#1111666).\n- ALSA: usb-audio: Fix UAC2/3 effect unit parsing (bsc#1111666).\n- ALSA: usb-audio: unlock on error in probe (bsc#1111666).\n- ALSA: usb-audio: Use lower hex numbers for IDs (bsc#1111666).\n- ALSA: usx2y: Adjust indentation in snd_usX2Y_hwdep_dsp_status (bsc#1051510).\n- amdgpu/gmc_v9: save/restore sdpif regs during S3 (bsc#1113956)\n- ASoC: dapm: Correct DAPM handling of active widgets during shutdown (bsc#1051510).\n- ASoC: pcm512x: Fix unbalanced regulator enable call in probe error path (bsc#1051510).\n- ASoC: pcm: Fix possible buffer overflow in dpcm state sysfs output (bsc#1051510).\n- ASoC: pcm: update FE/BE trigger order based on the command (bsc#1051510).\n- ASoC: topology: Fix memleak in soc_tplg_link_elems_load() (bsc#1051510).\n- atm: zatm: Fix empty body Clang warnings (bsc#1051510).\n- b43legacy: Fix -Wcast-function-type (bsc#1051510).\n- blk: Fix kabi due to blk_trace_mutex addition (bsc#1159285).\n- blktrace: fix dereference after null check (bsc#1159285).\n- blktrace: fix trace mutex deadlock (bsc#1159285).\n- bnxt_en: Fix NTUPLE firmware command failures (bsc#1104745 ).\n- bnxt_en: Fix TC queue mapping (networking-stable-20_02_05).\n- bnxt_en: Improve device shutdown method (bsc#1104745 ).\n- bnxt_en: Issue PCIe FLR in kdump kernel to cleanup pending DMAs (bsc#1134090 jsc#SLE-5954).\n- bonding/alb: properly access headers in bond_alb_xmit() (networking-stable-20_02_09).\n- bpf, offload: Replace bitwise AND by logical AND in bpf_prog_offload_info_fill (bsc#1109837).\n- CIFS: add a debug macro that prints \\\\server\\share for errors (bsc#1144333).\n- CIFS: add missing mount option to /proc/mounts (bsc#1144333).\n- CIFS: add new debugging macro cifs_server_dbg (bsc#1144333).\n- CIFS: add passthrough for smb2 setinfo (bsc#1144333).\n- CIFS: add SMB2_open() arg to return POSIX data (bsc#1144333).\n- CIFS: add smb2 POSIX info level (bsc#1144333).\n- CIFS: add SMB3 change notification support (bsc#1144333).\n- CIFS: add support for fallocate mode 0 for non-sparse files (bsc#1144333).\n- CIFS: Add support for setting owner info, dos attributes, and create time (bsc#1144333).\n- CIFS: Add tracepoints for errors on flush or fsync (bsc#1144333).\n- CIFS: Adjust indentation in smb2_open_file (bsc#1144333).\n- CIFS: allow chmod to set mode bits using special sid (bsc#1144333).\n- CIFS: Avoid doing network I/O while holding cache lock (bsc#1144333).\n- CIFS: call wake_up(server-\u003eresponse_q) inside of cifs_reconnect() (bsc#1144333).\n- CIFS: Clean up DFS referral cache (bsc#1144333).\n- CIFS: create a helper function to parse the query-directory response buffer (bsc#1144333).\n- CIFS: do d_move in rename (bsc#1144333).\n- CIFS: Do not display RDMA transport on reconnect (bsc#1144333).\n- CIFS: do not ignore the SYNC flags in getattr (bsc#1144333).\n- CIFS: do not leak -EAGAIN for stat() during reconnect (bsc#1144333).\n- CIFS: do not use \u0027pre:\u0027 for MODULE_SOFTDEP (bsc#1144333).\n- CIFS: enable change notification for SMB2.1 dialect (bsc#1144333).\n- CIFS: fail i/o on soft mounts if sessionsetup errors out (bsc#1144333).\n- CIFS: fix a comment for the timeouts when sending echos (bsc#1144333).\n- CIFS: fix a white space issue in cifs_get_inode_info() (bsc#1144333).\n- CIFS: fix dereference on ses before it is null checked (bsc#1144333).\n- CIFS: Fix memory allocation in __smb2_handle_cancelled_cmd() (bsc#1144333).\n- CIFS: fix mode bits from dir listing when mounted with modefromsid (bsc#1144333).\n- CIFS: Fix mode output in debugging statements (bsc#1144333).\n- CIFS: Fix mount options set in automount (bsc#1144333).\n- CIFS: fix NULL dereference in match_prepath (bsc#1144333).\n- CIFS: Fix potential deadlock when updating vol in cifs_reconnect() (bsc#1144333).\n- CIFS: fix potential mismatch of UNC paths (bsc#1144333).\n- CIFS: fix rename() by ensuring source handle opened with DELETE bit (bsc#1144333).\n- CIFS: Fix return value in __update_cache_entry (bsc#1144333).\n- CIFS: fix soft mounts hanging in the reconnect code (bsc#1144333).\n- CIFS: fix soft mounts hanging in the reconnect code (bsc#1144333).\n- CIFS: Fix task struct use-after-free on reconnect (bsc#1144333).\n- CIFS: fix unitialized variable poential problem with network I/O cache lock patch (bsc#1144333).\n- CIFS: get mode bits from special sid on stat (bsc#1144333).\n- CIFS: Get rid of kstrdup_const()\u0027d paths (bsc#1144333).\n- CIFS: handle prefix paths in reconnect (bsc#1144333).\n- CIFS: Introduce helpers for finding TCP connection (bsc#1144333).\n- CIFS: log warning message (once) if out of disk space (bsc#1144333).\n- CIFS: make sure we do not overflow the max EA buffer size (bsc#1144333).\n- CIFS: make use of cap_unix(ses) in cifs_reconnect_tcon() (bsc#1144333).\n- CIFS: Merge is_path_valid() into get_normalized_path() (bsc#1144333).\n- CIFS: modefromsid: make room for 4 ACE (bsc#1144333).\n- CIFS: modefromsid: write mode ACE first (bsc#1144333).\n- CIFS: Optimize readdir on reparse points (bsc#1144333).\n- CIFS: plumb smb2 POSIX dir enumeration (bsc#1144333).\n- CIFS: potential unintitliazed error code in cifs_getattr() (bsc#1144333).\n- CIFS: prepare SMB2_query_directory to be used with compounding (bsc#1144333).\n- CIFS: print warning once if mounting with vers=1.0 (bsc#1144333).\n- CIFS: refactor cifs_get_inode_info() (bsc#1144333).\n- CIFS: remove redundant assignment to pointer pneg_ctxt (bsc#1144333).\n- CIFS: remove redundant assignment to variable rc (bsc#1144333).\n- CIFS: remove set but not used variables (bsc#1144333).\n- CIFS: remove set but not used variable \u0027server\u0027 (bsc#1144333).\n- CIFS: remove unused variable (bsc#1144333).\n- CIFS: remove unused variable \u0027sid_user\u0027 (bsc#1144333).\n- CIFS: rename a variable in SendReceive() (bsc#1144333).\n- CIFS: rename posix create rsp (bsc#1144333).\n- CIFS: replace various strncpy with strscpy and similar (bsc#1144333).\n- CIFS: Return directly after a failed build_path_from_dentry() in cifs_do_create() (bsc#1144333).\n- CIFS: set correct max-buffer-size for smb2_ioctl_init() (bsc#1144333).\n- CIFS: smbd: Add messages on RDMA session destroy and reconnection (bsc#1144333).\n- CIFS: smbd: Invalidate and deregister memory registration on re-send for direct I/O (bsc#1144333).\n- CIFS: smbd: Only queue work for error recovery on memory registration (bsc#1144333).\n- CIFS: smbd: Return -EAGAIN when transport is reconnecting (bsc#1144333).\n- CIFS: smbd: Return -ECONNABORTED when trasnport is not in connected state (bsc#1144333).\n- CIFS: smbd: Return -EINVAL when the number of iovs exceeds SMBDIRECT_MAX_SGE (bsc#1144333).\n- CIFS: Use common error handling code in smb2_ioctl_query_info() (bsc#1144333).\n- CIFS: use compounding for open and first query-dir for readdir() (bsc#1144333).\n- CIFS: Use #define in cifs_dbg (bsc#1144333).\n- CIFS: Use memdup_user() rather than duplicating its implementation (bsc#1144333).\n- CIFS: use mod_delayed_work() for server-\u003ereconnect if already queued (bsc#1144333).\n- CIFS: use PTR_ERR_OR_ZERO() to simplify code (bsc#1144333).\n- cls_rsvp: fix rsvp_policy (networking-stable-20_02_05).\n- core: Do not skip generic XDP program execution for cloned SKBs (bsc#1109837).\n- cpufreq: powernv: Fix unsafe notifiers (bsc#1065729).\n- cpufreq: powernv: Fix use-after-free (bsc#1065729).\n- crypto: pcrypt - Fix user-after-free on module unload (git-fixes).\n- devlink: report 0 after hitting end in region read (bsc#1109837).\n- dmaengine: coh901318: Fix a double lock bug in dma_tc_handle() (bsc#1051510).\n- driver core: platform: fix u32 greater or equal to zero comparison (bsc#1051510).\n- driver core: platform: Prevent resouce overflow from causing infinite loops (bsc#1051510).\n- driver core: Print device when resources present in really_probe() (bsc#1051510).\n- drivers/md/raid5.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003).\n- drivers/md/raid5-ppl.c: use the new spelling of RWH_WRITE_LIFE_NOT_SET (bsc#1166003).\n- drm/amd/dm/mst: Ignore payload update failures (bsc#1112178)\n- drm/amdkfd: fix a use after free race with mmu_notifer unregister (bsc#1114279)\n- drm: atmel-hlcdc: enable clock before configuring timing engine (bsc#1114279)\n- drm/etnaviv: fix dumping of iommuv2 (bsc#1114279)\n- drm/gma500: Fixup fbdev stolen size usage evaluation (bsc#1051510).\n- drm/i915/gvt: Fix orphan vgpu dmabuf_objs\u0027 lifetime (git-fixes).\n- drm/i915/gvt: Fix unnecessary schedule timer when no vGPU exits (git-fixes).\n- drm/i915/gvt: Separate display reset from ALL_ENGINES reset (bsc#1114279)\n- drm/i915: Program MBUS with rmw during initialization (git-fixes).\n- drm/i915/selftests: Fix return in assert_mmap_offset() (bsc#1114279) \n- drm/i915/userptr: fix size calculation (bsc#1114279)\n- drm/i915/userptr: Try to acquire the page lock around (bsc#1114279)\n- drm/i915: Wean off drm_pci_alloc/drm_pci_free (bsc#1114279)\n- drm/mediatek: Add gamma property according to hardware capability (bsc#1114279)\n- drm/mediatek: disable all the planes in atomic_disable (bsc#1114279)\n- drm/mediatek: handle events when enabling/disabling crtc (bsc#1051510).\n- drm/mipi_dbi: Fix off-by-one bugs in mipi_dbi_blank() (bsc#1114279)\n- drm: msm: mdp4: Adjust indentation in mdp4_dsi_encoder_enable (bsc#1114279)\n- drm/nouveau/disp/nv50-: prevent oops when no channel method map provided (bsc#1051510).\n- drm/nouveau/gr/gk20a,gm200-: add terminators to method lists read from fw (bsc#1051510).\n- drm/nouveau/kms/gv100-: Re-set LUT after clearing for modesets (git-fixes).\n- drm: rcar-du: Recognize \u0027renesas,vsps\u0027 in addition to \u0027vsps\u0027 (bsc#1114279)\n- drm: remove the newline for CRC source name (bsc#1051510).\n- EDAC/mc: Fix use-after-free and memleaks during device removal (bsc#1114279).\n- Enabled the following two patches in series.conf, and refresh the KABI patch due to previous md commit (bsc#1119680)\n- ethtool: Factored out similar ethtool link settings for virtual devices to core (bsc#1136157 ltc#177197).\n- fcntl: fix typo in RWH_WRITE_LIFE_NOT_SET r/w hint name (bsc#1166003).\n- firmware: imx: misc: Align imx sc msg structs to 4 (git-fixes).\n- firmware: imx: scu: Ensure sequential TX (git-fixes).\n- firmware: imx: scu-pd: Align imx sc msg structs to 4 (git-fixes).\n- Fixed memory leak in large read decrypt offload (bsc#1144333).\n- Fixed some regressions (bsc#1165527 ltc#184149).\n- fs/cifs/cifssmb.c: use true,false for bool variable (bsc#1144333).\n- fs: cifs: cifsssmb: remove redundant assignment to variable ret (bsc#1144333).\n- fs: cifs: Initialize filesystem timestamp ranges (bsc#1144333).\n- fs: cifs: mute -Wunused-const-variable message (bsc#1144333).\n- fs/cifs/sess.c: Remove set but not used variable \u0027capabilities\u0027 (bsc#1144333).\n- fs/cifs/smb2ops.c: use true,false for bool variable (bsc#1144333).\n- fs/cifs/smb2pdu.c: Make SMB2_notify_init static (bsc#1144333).\n- fs/xfs: fix f_ffree value for statfs when project quota is set (bsc#1165985).\n- gtp: make sure only SOCK_DGRAM UDP sockets are accepted (networking-stable-20_01_27).\n- gtp: use __GFP_NOWARN to avoid memalloc warning (networking-stable-20_02_05).\n- HID: core: fix off-by-one memset in hid_report_raw_event() (bsc#1051510).\n- HID: hiddev: Fix race in in hiddev_disconnect() (git-fixes).\n- hv_netvsc: Fix memory leak when removing rndis device (networking-stable-20_01_20).\n- hwmon: (adt7462) Fix an error return in ADT7462_REG_VOLT() (bsc#1051510).\n- IB/hfi1: Close window for pq and request coliding (bsc#1060463 ).\n- ibmvfc: Fix NULL return compiler warning (bsc#1161951 ltc#183551).\n- ibmvnic: Do not process device remove during device reset (bsc#1065729).\n- ibmvnic: Warn unknown speed message only when carrier is present (bsc#1065729).\n- Input: edt-ft5x06 - work around first register access error (bsc#1051510).\n- Input: synaptics - enable SMBus on ThinkPad L470 (bsc#1051510).\n- Input: synaptics - remove the LEN0049 dmi id from topbuttonpad list (bsc#1051510).\n- Input: synaptics - switch T470s to RMI4 by default (bsc#1051510).\n- iommu/amd: Check feature support bit before accessing MSI capability registers (bsc#1166101).\n- iommu/amd: Only support x2APIC with IVHD type 11h/40h (bsc#1166102).\n- iommu/amd: Remap the IOMMU device table with the memory encryption mask for kdump (bsc#1141895).\n- iommu/dma: Fix MSI reservation allocation (bsc#1166730).\n- iommu/vt-d: dmar: replace WARN_TAINT with pr_warn + add_taint (bsc#1166731).\n- iommu/vt-d: Fix a bug in intel_iommu_iova_to_phys() for huge page (bsc#1166732).\n- iommu/vt-d: Fix compile warning from intel-svm.h (bsc#1166103).\n- iommu/vt-d: Fix the wrong printing in RHSA parsing (bsc#1166733).\n- iommu/vt-d: Ignore devices with out-of-spec domain number (bsc#1166734).\n- iommu/vt-d: quirk_ioat_snb_local_iommu: replace WARN_TAINT with pr_warn + add_taint (bsc#1166735).\n- ipv4: ensure rcu_read_lock() in cipso_v4_error() (git-fixes).\n- ipv6: restrict IPV6_ADDRFORM operation (bsc#1109837).\n- iwlegacy: Fix -Wcast-function-type (bsc#1051510).\n- iwlwifi: mvm: Do not require PHY_SKU NVM section for 3168 devices (bsc#1166632).\n- iwlwifi: mvm: Fix thermal zone registration (bsc#1051510).\n- kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled (bsc#1141895).\n- kernel/module.c: Only return -EEXIST for modules that have finished loading (bsc#1165488).\n- kernel/module.c: wakeup processes in module_wq on module unload (bsc#1165488).\n- kexec: Allocate decrypted control pages for kdump if SME is enabled (bsc#1141895).\n- KVM: arm64: Store vcpu on the stack during __guest_enter() (bsc#1133021).\n- KVM: s390: do not clobber registers during guest reset/store status (bsc#1133021).\n- KVM: s390: ENOTSUPP -\u003e EOPNOTSUPP fixups (bsc#1133021).\n- KVM: VMX: check descriptor table exits on instruction emulation (bsc#1166104).\n- l2tp: Allow duplicate session creation with UDP (networking-stable-20_02_05).\n- libnvdimm/pfn_dev: Do not clear device memmap area during generic namespace probe (bsc#1165929 bsc#1165950).\n- libnvdimm/pfn: fix fsdax-mode namespace info-block zero-fields (bsc#1165929).\n- libnvdimm: remove redundant __func__ in dev_dbg (bsc#1165929).\n- lib/raid6: add missing include for raid6test (bsc#1166003).\n- lib/raid6: add option to skip algo benchmarking (bsc#1166003).\n- lib/raid6: avoid __attribute_const__ redefinition (bsc#1166003).\n- md: add __acquires/__releases annotations to handle_active_stripes (bsc#1166003).\n- md: add __acquires/__releases annotations to (un)lock_two_stripes (bsc#1166003).\n- md: add a missing endianness conversion in check_sb_changes (bsc#1166003).\n- md: add bitmap_abort label in md_run (bsc#1166003).\n- md: add feature flag MD_FEATURE_RAID0_LAYOUT (bsc#1166003).\n- md: allow last device to be forcibly removed from RAID1/RAID10 (bsc#1166003).\n- md: avoid invalid memory access for array sb-\u003edev_roles (bsc#1166003).\n- md/bitmap: avoid race window between md_bitmap_resize and bitmap_file_clear_bit (bsc#1166003).\n- md-bitmap: create and destroy wb_info_pool with the change of backlog (bsc#1166003).\n- md-bitmap: create and destroy wb_info_pool with the change of bitmap (bsc#1166003).\n- md-bitmap: small cleanups (bsc#1166003).\n- md/bitmap: use mddev_suspend/resume instead of -\u003equiesce() (bsc#1166003).\n- md-cluster/bitmap: do not call md_bitmap_sync_with_cluster during reshaping stage (bsc#1166003).\n- md-cluster: introduce resync_info_get interface for sanity check (bsc#1166003).\n- md-cluster/raid10: call update_size in md_reap_sync_thread (bsc#1166003).\n- md-cluster/raid10: do not call remove_and_add_spares during reshaping stage (bsc#1166003).\n- md-cluster/raid10: resize all the bitmaps before start reshape (bsc#1166003).\n- md-cluster/raid10: support add disk under grow mode (bsc#1166003).\n- md-cluster: remove suspend_info (bsc#1166003).\n- md-cluster: send BITMAP_NEEDS_SYNC message if reshaping is interrupted (bsc#1166003).\n- md: convert to kvmalloc (bsc#1166003).\n- md: do not call spare_active in md_reap_sync_thread if all member devices can\u0027t work (bsc#1166003).\n- md: do not set In_sync if array is frozen (bsc#1166003).\n- md: fix a typo s/creat/create (bsc#1166003).\n- md: fix for divide error in status_resync (bsc#1166003).\n- md: fix spelling typo and add necessary space (bsc#1166003).\n- md: introduce mddev_create/destroy_wb_pool for the change of member device (bsc#1166003).\n- md-linear: use struct_size() in kzalloc() (bsc#1166003).\n- md: Make bio_alloc_mddev use bio_alloc_bioset (bsc#1166003).\n- md: make sure desc_nr less than MD_SB_DISKS (bsc#1166003).\n- md: md.c: Return -ENODEV when mddev is NULL in rdev_attr_show (bsc#1166003).\n- md: no longer compare spare disk superblock events in super_load (bsc#1166003).\n- md/raid0: Fix an error message in raid0_make_request() (bsc#1166003).\n- md raid0/linear: Mark array as \u0027broken\u0027 and fail BIOs if a member is gone (bsc#1166003).\n- md/raid10: end bio when the device faulty (bsc#1166003).\n- md/raid10: Fix raid10 replace hang when new added disk faulty (bsc#1166003).\n- md/raid10: prevent access of uninitialized resync_pages offset (bsc#1166003).\n- md/raid10: read balance chooses idlest disk for SSD (bsc#1166003).\n- md: raid10: Use struct_size() in kmalloc() (bsc#1166003).\n- md/raid1: avoid soft lockup under high load (bsc#1166003).\n- md: raid1: check rdev before reference in raid1_sync_request func (bsc#1166003).\n- md/raid1: end bio when the device faulty (bsc#1166003).\n- md/raid1: fail run raid1 array when active disk less than one (bsc#1166003).\n- md/raid1: Fix a warning message in remove_wb() (bsc#1166003).\n- md/raid1: fix potential data inconsistency issue with write behind device (bsc#1166003).\n- md/raid1: get rid of extra blank line and space (bsc#1166003).\n- md/raid5: use bio_end_sector to calculate last_sector (bsc#1166003).\n- md/raid6: fix algorithm choice under larger PAGE_SIZE (bsc#1166003).\n- md: remove set but not used variable \u0027bi_rdev\u0027 (bsc#1166003).\n- md: rename wb stuffs (bsc#1166003).\n- md: return -ENODEV if rdev has no mddev assigned (bsc#1166003).\n- md: use correct type in super_1_load (bsc#1166003).\n- md: use correct type in super_1_sync (bsc#1166003).\n- md: use correct types in md_bitmap_print_sb (bsc#1166003).\n- media: uvcvideo: Refactor teardown of uvc on USB disconnect (bsc#1164507).\n- mlxsw: spectrum_qdisc: Include MC TCs in Qdisc counters (bsc#1112374).\n- mlxsw: spectrum: Wipe xstats.backlog of down ports (bsc#1112374).\n- net: cxgb3_main: Add CAP_NET_ADMIN check to CHELSIO_GET_MEM (networking-stable-20_01_27).\n- net: dsa: mv88e6xxx: Preserve priority when setting CPU port (networking-stable-20_01_11).\n- net: dsa: tag_qca: fix doubled Tx statistics (networking-stable-20_01_20).\n- net/ethtool: Introduce link_ksettings API for virtual network devices (bsc#1136157 ltc#177197).\n- net: Fix Tx hash bound checking (bsc#1109837).\n- net: hns3: fix a copying IPv6 address error in hclge_fd_get_flow_tuples() (bsc#1104353).\n- net: hns: fix soft lockup when there is not enough memory (networking-stable-20_01_20).\n- net: hsr: fix possible NULL deref in hsr_handle_frame() (networking-stable-20_02_05).\n- net: ip6_gre: fix moving ip6gre between namespaces (networking-stable-20_01_27).\n- net, ip6_tunnel: fix namespaces move (networking-stable-20_01_27).\n- net, ip_tunnel: fix namespaces move (networking-stable-20_01_27).\n- net: macb: Limit maximum GEM TX length in TSO (networking-stable-20_02_09).\n- net: macb: Remove unnecessary alignment check for TSO (networking-stable-20_02_09).\n- net/mlx5: Fix lowest FDB pool size (bsc#1103990).\n- net/mlx5: IPsec, Fix esp modify function attribute (bsc#1103990 ).\n- net/mlx5: IPsec, fix memory leak at mlx5_fpga_ipsec_delete_sa_ctx (bsc#1103990).\n- net/mlx5: Update the list of the PCI supported devices (bsc#1127611).\n- net/mlxfw: Verify FSM error code translation does not exceed array size (bsc#1051858).\n- net: mvneta: move rx_dropped and rx_errors in per-cpu stats (networking-stable-20_02_09).\n- net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link() (networking-stable-20_01_27).\n- net_sched: ematch: reject invalid TCF_EM_SIMPLE (networking-stable-20_01_30).\n- net_sched: fix an OOB access in cls_tcindex (networking-stable-20_02_05).\n- net_sched: fix a resource leak in tcindex_set_parms() (networking-stable-20_02_09).\n- net_sched: fix datalen for ematch (networking-stable-20_01_27).\n- net: sch_prio: When ungrafting, replace with FIFO (networking-stable-20_01_11).\n- net/smc: add fallback check to connect() (git-fixes).\n- net/smc: fix cleanup for linkgroup setup failures (git-fixes).\n- net/smc: no peer ID in CLC decline for SMCD (git-fixes).\n- net/smc: transfer fasync_list in case of fallback (git-fixes).\n- net: stmmac: dwmac-sunxi: Allow all RGMII modes (networking-stable-20_01_11).\n- net-sysfs: Fix reference count leak (networking-stable-20_01_27).\n- net: systemport: Avoid RBUF stuck in Wake-on-LAN mode (networking-stable-20_02_09).\n- net/tls: fix async operation (bsc#1109837).\n- net/tls: free the record on encryption error (bsc#1109837).\n- net/tls: take into account that bpf_exec_tx_verdict() may free the record (bsc#1109837).\n- net: usb: lan78xx: Add .ndo_features_check (networking-stable-20_01_27).\n- net: usb: lan78xx: fix possible skb leak (networking-stable-20_01_11).\n- net/wan/fsl_ucc_hdlc: fix out of bounds write on array utdm_info (networking-stable-20_01_20).\n- NFC: pn544: Fix a typo in a debug message (bsc#1051510).\n- NFC: port100: Convert cpu_to_le16(le16_to_cpu(E1) + E2) to use le16_add_cpu() (bsc#1051510).\n- nvme: Fix parsing of ANA log page (bsc#1166658).\n- nvme: resync include/linux/nvme.h with nvmecli (bsc#1156510).\n- nvme: Translate more status codes to blk_status_t (bsc#1156510).\n- orinoco: avoid assertion in case of NULL pointer (bsc#1051510).\n- padata: always acquire cpu_hotplug_lock before pinst-\u003elock (git-fixes).\n- PCI/AER: Clear device status bits during ERR_COR handling (bsc#1161561).\n- PCI/AER: Clear device status bits during ERR_FATAL and ERR_NONFATAL (bsc#1161561).\n- PCI/AER: Clear only ERR_FATAL status bits during fatal recovery (bsc#1161561).\n- PCI/AER: Clear only ERR_NONFATAL bits during non-fatal recovery (bsc#1161561).\n- PCI/AER: Do not clear AER bits if error handling is Firmware-First (bsc#1161561).\n- PCI/AER: Do not read upstream ports below fatal errors (bsc#1161561).\n- PCI/AER: Factor out ERR_NONFATAL status bit clearing (bsc#1161561).\n- PCI/AER: Take reference on error devices (bsc#1161561).\n- PCI/ERR: Run error recovery callbacks for all affected devices (bsc#1161561).\n- PCI/ERR: Use slot reset if available (bsc#1161561).\n- pinctrl: baytrail: Do not clear IRQ flags on direct-irq enabled pins (bsc#1051510).\n- pinctrl: imx: scu: Align imx sc msg structs to 4 (git-fixes).\n- pinctrl: sh-pfc: sh7264: Fix CAN function GPIOs (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Fix CAN function GPIOs (bsc#1051510).\n- pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM (networking-stable-20_01_11).\n- platform/mellanox: fix potential deadlock in the tmfifo driver (bsc#1136333 jsc#SLE-4994).\n- powerpc: fix hardware PMU exception bug on PowerVM compatibility mode systems (bsc#1056686).\n- powerpc/pseries: Avoid NULL pointer dereference when drmem is unavailable (bsc#1160659).\n- powerpc/pseries: fix of_read_drc_info_cell() to point at next record (bsc#1165980 ltc#183834).\n- powerpc/pseries: group lmb operation and memblock\u0027s (bsc#1165404 ltc#183498).\n- powerpc/pseries/memory-hotplug: Only update DT once per memory DLPAR request (bsc#1165404 ltc#183498).\n- powerpc/pseries: update device tree before ejecting hotplug uevents (bsc#1165404 ltc#183498).\n- powerpc/smp: Use nid as fallback for package_id (bsc#1165813 ltc#184091).\n- ptr_ring: add include of linux/mm.h (bsc#1109837).\n- qmi_wwan: re-add DW5821e pre-production variant (bsc#1051510).\n- raid10: refactor common wait code from regular read/write request (bsc#1166003).\n- raid1: factor out a common routine to handle the completion of sync write (bsc#1166003).\n- raid1: simplify raid1_error function (bsc#1166003).\n- raid1: use an int as the return value of raise_barrier() (bsc#1166003).\n- raid5: block failing device if raid will be failed (bsc#1166003).\n- raid5: do not increment read_errors on EILSEQ return (bsc#1166003).\n- raid5: do not set STRIPE_HANDLE to stripe which is in batch list (bsc#1166003).\n- raid5 improve too many read errors msg by adding limits (bsc#1166003).\n- raid5: need to set STRIPE_HANDLE for batch head (bsc#1166003).\n- raid5: remove STRIPE_OPS_REQ_PENDING (bsc#1166003).\n- raid5: remove worker_cnt_per_group argument from alloc_thread_groups (bsc#1166003). \n- raid5: set write hint for PPL (bsc#1166003).\n- raid5: use bio_end_sector in r5_next_bio (bsc#1166003).\n- raid6/test: fix a compilation error (bsc#1166003).\n- raid6/test: fix a compilation warning (bsc#1166003).\n- RDMA/cma: Fix unbalanced cm_id reference count during address resolve (bsc#1103992).\n- RDMA/hfi1: Fix memory leak in _dev_comp_vect_mappings_create (bsc#1114685).\n- RDMA/uverbs: Verify MR access flags (bsc#1103992).\n- remoteproc: Initialize rproc_class before use (bsc#1051510).\n- Revert \u0027HID: add NOGET quirk for Eaton Ellipse MAX UPS\u0027 (git-fixes).\n- rtlwifi: rtl_pci: Fix -Wcast-function-type (bsc#1051510).\n- rxrpc: Fix insufficient receive notification generation (networking-stable-20_02_05).\n- s390/pci: Fix unexpected write combine on resource (git-fixes).\n- s390/uv: Fix handling of length extensions (git-fixes).\n- scsi: fnic: do not queue commands during fwreset (bsc#1146539).\n- scsi: ibmvfc: Add failed PRLI to cmd_status lookup array (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Byte swap status and error codes when logging (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Clean up transport events (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: constify dev_pm_ops structures (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Do not call fc_block_scsi_eh() on host reset (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: ibmvscsi: ibmvscsi_tgt: constify vio_device_id (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Mark expected switch fall-throughs (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Remove \u0027failed\u0027 from logged errors (bsc#1161951 ltc#183551).\n- scsi: ibmvfc: Remove unneeded semicolons (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: change strncpy+truncation to strlcpy (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: constify dev_pm_ops structures (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Do not use rc uninitialized in ibmvscsi_do_work (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: fix tripping of blk_mq_run_hw_queue WARN_ON (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Improve strings handling (bsc#1161951 ltc#183551). \n- scsi: ibmvscsi: redo driver work thread to use enum action states (bsc#1161951 ltc#183551).\n- scsi: ibmvscsi: Wire up host_reset() in the driver\u0027s scsi_host_template (bsc#1161951 ltc#183551).\n- scsi: qla2xxx: Add 16.0GT for PCI String (bsc#1157424).\n- scsi: qla2xxx: Add beacon LED config sysfs interface (bsc#1157424).\n- scsi: qla2xxx: Add changes in preparation for vendor extended FDMI/RDP (bsc#1157424).\n- scsi: qla2xxx: Add deferred queue for processing ABTS and RDP (bsc#1157424).\n- scsi: qla2xxx: Add endianizer macro calls to fc host stats (bsc#1157424).\n- scsi: qla2xxx: Add fixes for mailbox command (bsc#1157424).\n- scsi: qla2xxx: add more FW debug information (bsc#1157424).\n- scsi: qla2xxx: Add ql2xrdpenable module parameter for RDP (bsc#1157424).\n- scsi: qla2xxx: Add sysfs node for D-Port Diagnostics AEN data (bsc#1157424).\n- scsi: qla2xxx: Add vendor extended FDMI commands (bsc#1157424).\n- scsi: qla2xxx: Add vendor extended RDP additions and amendments (bsc#1157424).\n- scsi: qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options (bsc#1157424).\n- scsi: qla2xxx: Check locking assumptions at runtime in qla2x00_abort_srb() (bsc#1157424).\n- scsi: qla2xxx: Cleanup ELS/PUREX iocb fields (bsc#1157424).\n- scsi: qla2xxx: Convert MAKE_HANDLE() from a define into an inline function (bsc#1157424).\n- scsi: qla2xxx: Correction to selection of loopback/echo test (bsc#1157424).\n- scsi: qla2xxx: Display message for FCE enabled (bsc#1157424).\n- scsi: qla2xxx: Fix control flags for login/logout IOCB (bsc#1157424).\n- scsi: qla2xxx: Fix FCP-SCSI FC4 flag passing error (bsc#1157424).\n- scsi: qla2xxx: fix FW resource count values (bsc#1157424).\n- scsi: qla2xxx: Fix NPIV instantiation after FW dump (bsc#1157424).\n- scsi: qla2xxx: Fix qla2x00_echo_test() based on ISP type (bsc#1157424).\n- scsi: qla2xxx: Fix RDP respond data format (bsc#1157424).\n- scsi: qla2xxx: Fix RDP response size (bsc#1157424).\n- scsi: qla2xxx: Fix sparse warning reported by kbuild bot (bsc#1157424).\n- scsi: qla2xxx: Fix sparse warnings triggered by the PCI state checking code (bsc#1157424).\n- scsi: qla2xxx: Force semaphore on flash validation failure (bsc#1157424).\n- scsi: qla2xxx: Handle cases for limiting RDP response payload length (bsc#1157424).\n- scsi: qla2xxx: Handle NVME status iocb correctly (bsc#1157424).\n- scsi: qla2xxx: Improved secure flash support messages (bsc#1157424).\n- scsi: qla2xxx: Move free of fcport out of interrupt context (bsc#1157424).\n- scsi: qla2xxx: Print portname for logging in qla24xx_logio_entry() (bsc#1157424).\n- scsi: qla2xxx: Remove restriction of FC T10-PI and FC-NVMe (bsc#1157424).\n- scsi: qla2xxx: Return appropriate failure through BSG Interface (bsc#1157424).\n- scsi: qla2xxx: Save rscn_gen for new fcport (bsc#1157424).\n- scsi: qla2xxx: Serialize fc_port alloc in N2N (bsc#1157424).\n- scsi: qla2xxx: Set Nport ID for N2N (bsc#1157424).\n- scsi: qla2xxx: Show correct port speed capabilities for RDP command (bsc#1157424).\n- scsi: qla2xxx: Simplify the code for aborting SCSI commands (bsc#1157424).\n- scsi: qla2xxx: Suppress endianness complaints in qla2x00_configure_local_loop() (bsc#1157424).\n- scsi: qla2xxx: Update BPM enablement semantics (bsc#1157424).\n- scsi: qla2xxx: Update driver version to 10.01.00.24-k (bsc#1157424).\n- scsi: qla2xxx: Update driver version to 10.01.00.25-k (bsc#1157424).\n- scsi: qla2xxx: Use a dedicated interrupt handler for \u0027handshake-required\u0027 ISPs (bsc#1157424).\n- scsi: qla2xxx: Use correct ISP28xx active FW region (bsc#1157424).\n- scsi: qla2xxx: Use endian macros to assign static fields in fwdump header (bsc#1157424).\n- scsi: qla2xxx: Use FC generic update firmware options routine for ISP27xx (bsc#1157424).\n- scsi: qla2xxx: Use QLA_FW_STOPPED macro to propagate flag (bsc#1157424).\n- scsi: tcm_qla2xxx: Make qlt_alloc_qfull_cmd() set cmd-\u003ese_cmd.map_tag (bsc#1157424).\n- sctp: free cmd-\u003eobj.chunk for the unprocessed SCTP_CMD_REPLY (networking-stable-20_01_11).\n- smb3: add debug messages for closing unmatched open (bsc#1144333).\n- smb3: Add defines for new information level, FileIdInformation (bsc#1144333).\n- smb3: add dynamic tracepoints for flush and close (bsc#1144333).\n- smb3: add missing flag definitions (bsc#1144333).\n- smb3: Add missing reparse tags (bsc#1144333).\n- smb3: add missing worker function for SMB3 change notify (bsc#1144333).\n- smb3: add mount option to allow forced caching of read only share (bsc#1144333).\n- smb3: add mount option to allow RW caching of share accessed by only 1 client (bsc#1144333).\n- smb3: add one more dynamic tracepoint missing from strict fsync path (bsc#1144333).\n- smb3: add some more descriptive messages about share when mounting cache=ro (bsc#1144333).\n- smb3: allow decryption keys to be dumped by admin for debugging (bsc#1144333).\n- smb3: allow disabling requesting leases (bsc#1144333).\n- smb3: allow parallelizing decryption of reads (bsc#1144333).\n- smb3: allow skipping signature verification for perf sensitive configurations (bsc#1144333).\n- smb3: Backup intent flag missing from some more ops (bsc#1144333).\n- smb3: cleanup some recent endian errors spotted by updated sparse (bsc#1144333).\n- smb3: display max smb3 requests in flight at any one time (bsc#1144333).\n- smb3: dump in_send and num_waiters stats counters by default (bsc#1144333).\n- smb3: enable offload of decryption of large reads via mount option (bsc#1144333).\n- smb3: fix default permissions on new files when mounting with modefromsid (bsc#1144333).\n- smb3: fix mode passed in on create for modetosid mount option (bsc#1144333).\n- smb3: fix performance regression with setting mtime (bsc#1144333).\n- smb3: fix potential null dereference in decrypt offload (bsc#1144333).\n- smb3: fix problem with null cifs super block with previous patch (bsc#1144333).\n- smb3: Fix regression in time handling (bsc#1144333).\n- smb3: improve check for when we send the security descriptor context on create (bsc#1144333).\n- smb3: log warning if CSC policy conflicts with cache mount option (bsc#1144333).\n- smb3: missing ACL related flags (bsc#1144333).\n- smb3: only offload decryption of read responses if multiple requests (bsc#1144333).\n- smb3: pass mode bits into create calls (bsc#1144333).\n- smb3: print warning once if posix context returned on open  (bsc#1144333).\n- smb3: query attributes on file close (bsc#1144333).\n- smb3: remove noisy debug message and minor cleanup (bsc#1144333).\n- smb3: remove unused flag passed into close functions (bsc#1144333).\n- staging: rtl8188eu: Fix potential overuse of kernel memory (bsc#1051510).\n- staging: rtl8188eu: Fix potential security hole (bsc#1051510).\n- staging: rtl8723bs: Fix potential overuse of kernel memory (bsc#1051510).\n- staging: rtl8723bs: Fix potential security hole (bsc#1051510).\n- SUNRPC: Fix svcauth_gss_proxy_init() (bsc#1103992).\n- tcp_bbr: improve arithmetic division in bbr_update_bw() (networking-stable-20_01_27).\n- tcp: clear tp-\u003edata_segs{in|out} in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003edelivered in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003esegs_{in|out} in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: clear tp-\u003etotal_retrans in tcp_disconnect() (networking-stable-20_02_05).\n- tcp: fix marked lost packets not being retransmitted (networking-stable-20_01_20).\n- tcp: fix \u0027old stuff\u0027 D-SACK causing SACK to be treated as D-SACK (networking-stable-20_01_11).\n- thunderbolt: Prevent crash if non-active NVMem file is read (git-fixes).\n- tick: broadcast-hrtimer: Fix a race in bc_set_next (bsc#1044231).\n- tools lib traceevent: Do not free tep-\u003ecmdlines in add_new_comm() on failure (git-fixes).\n- tools: Update include/uapi/linux/fcntl.h copy from the kernel (bsc#1166003).\n- ttyprintk: fix a potential deadlock in interrupt context issue (git-fixes).\n- tun: add mutex_unlock() call and napi.skb clearing in tun_get_user() (bsc#1109837).\n- Updated block layer, timers and md code for SLE15-SP1 kernel (bsc#1111974).\n- Updated \u0027drm/i915: Wean off drm_pci_alloc/drm_pci_free\u0027 (bsc#1114279) \n- USB: core: add endpoint-blacklist quirk (git-fixes).\n- USBip: Fix uninitialized symbol \u0027nents\u0027 in stub_recv_cmd_submit() (git-fixes).\n- USB: quirks: blacklist duplicate ep on Sound Devices USBPre2 (git-fixes).\n- uvcvideo: Refactor teardown of uvc on USB disconnect (https://patchwork.kernel.org/patch/9683663/) (bsc#1164507)\n- vgacon: Fix a UAF in vgacon_invert_region (bsc#1114279)\n- virtio-blk: fix hw_queue stopped on arbitrary error (git-fixes).\n- vlan: fix memory leak in vlan_dev_set_egress_priority (networking-stable-20_01_11).\n- vlan: vlan_changelink() should propagate errors (networking-stable-20_01_11).\n- vxlan: fix tos value before xmit (networking-stable-20_01_11).\n- x86/cpu/amd: Enable the fixed Instructions Retired counter IRPERF (bsc#1114279).\n- x86/ioremap: Add an ioremap_encrypted() helper (bsc#1141895).\n- x86/kdump: Export the SME mask to vmcoreinfo (bsc#1141895).\n- x86/mce/amd: Fix kobject lifetime (bsc#1114279).\n- x86/mce/amd: Publish the bank pointer only after setup has succeeded (bsc#1114279).\n- x86/mm: Split vmalloc_sync_all() (bsc#1165741).\n- xfs: also remove cached ACLs when removing the underlying attr (bsc#1165873).\n- xfs: bulkstat should copy lastip whenever userspace supplies one (bsc#1165984).\n- xhci: fix runtime pm enabling for quirky Intel hosts (bsc#1051510).\n- xhci: Force Maximum Packet size for Full-speed bulk devices to valid range (bsc#1051510).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2020-836,SUSE-SLE-Module-Basesystem-15-SP1-2020-836,SUSE-SLE-Module-Development-Tools-15-SP1-2020-836,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-836,SUSE-SLE-Module-Legacy-15-SP1-2020-836,SUSE-SLE-Module-Live-Patching-15-SP1-2020-836,SUSE-SLE-Product-HA-15-SP1-2020-836,SUSE-SLE-Product-WE-15-SP1-2020-836",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_0836-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2020:0836-1",
        "url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200836-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2020:0836-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2020-March/006656.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1044231",
        "url": "https://bugzilla.suse.com/1044231"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051858",
        "url": "https://bugzilla.suse.com/1051858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1056686",
        "url": "https://bugzilla.suse.com/1056686"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1060463",
        "url": "https://bugzilla.suse.com/1060463"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103990",
        "url": "https://bugzilla.suse.com/1103990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103992",
        "url": "https://bugzilla.suse.com/1103992"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104353",
        "url": "https://bugzilla.suse.com/1104353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1104745",
        "url": "https://bugzilla.suse.com/1104745"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109837",
        "url": "https://bugzilla.suse.com/1109837"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111666",
        "url": "https://bugzilla.suse.com/1111666"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1111974",
        "url": "https://bugzilla.suse.com/1111974"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112178",
        "url": "https://bugzilla.suse.com/1112178"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1112374",
        "url": "https://bugzilla.suse.com/1112374"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1113956",
        "url": "https://bugzilla.suse.com/1113956"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114279",
        "url": "https://bugzilla.suse.com/1114279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114685",
        "url": "https://bugzilla.suse.com/1114685"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1119680",
        "url": "https://bugzilla.suse.com/1119680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127611",
        "url": "https://bugzilla.suse.com/1127611"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1133021",
        "url": "https://bugzilla.suse.com/1133021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1134090",
        "url": "https://bugzilla.suse.com/1134090"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1136157",
        "url": "https://bugzilla.suse.com/1136157"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1141895",
        "url": "https://bugzilla.suse.com/1141895"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144333",
        "url": "https://bugzilla.suse.com/1144333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146539",
        "url": "https://bugzilla.suse.com/1146539"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156510",
        "url": "https://bugzilla.suse.com/1156510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157424",
        "url": "https://bugzilla.suse.com/1157424"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158187",
        "url": "https://bugzilla.suse.com/1158187"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159285",
        "url": "https://bugzilla.suse.com/1159285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160659",
        "url": "https://bugzilla.suse.com/1160659"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161561",
        "url": "https://bugzilla.suse.com/1161561"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1161951",
        "url": "https://bugzilla.suse.com/1161951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162928",
        "url": "https://bugzilla.suse.com/1162928"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162929",
        "url": "https://bugzilla.suse.com/1162929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162931",
        "url": "https://bugzilla.suse.com/1162931"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164078",
        "url": "https://bugzilla.suse.com/1164078"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164507",
        "url": "https://bugzilla.suse.com/1164507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165111",
        "url": "https://bugzilla.suse.com/1165111"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165404",
        "url": "https://bugzilla.suse.com/1165404"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165488",
        "url": "https://bugzilla.suse.com/1165488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165527",
        "url": "https://bugzilla.suse.com/1165527"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165741",
        "url": "https://bugzilla.suse.com/1165741"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165813",
        "url": "https://bugzilla.suse.com/1165813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165873",
        "url": "https://bugzilla.suse.com/1165873"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165929",
        "url": "https://bugzilla.suse.com/1165929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165950",
        "url": "https://bugzilla.suse.com/1165950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165980",
        "url": "https://bugzilla.suse.com/1165980"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165984",
        "url": "https://bugzilla.suse.com/1165984"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1165985",
        "url": "https://bugzilla.suse.com/1165985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166003",
        "url": "https://bugzilla.suse.com/1166003"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166101",
        "url": "https://bugzilla.suse.com/1166101"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166102",
        "url": "https://bugzilla.suse.com/1166102"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166103",
        "url": "https://bugzilla.suse.com/1166103"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166104",
        "url": "https://bugzilla.suse.com/1166104"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166632",
        "url": "https://bugzilla.suse.com/1166632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166658",
        "url": "https://bugzilla.suse.com/1166658"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166730",
        "url": "https://bugzilla.suse.com/1166730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166731",
        "url": "https://bugzilla.suse.com/1166731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166732",
        "url": "https://bugzilla.suse.com/1166732"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166733",
        "url": "https://bugzilla.suse.com/1166733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166734",
        "url": "https://bugzilla.suse.com/1166734"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1166735",
        "url": "https://bugzilla.suse.com/1166735"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-19768 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-19768/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8647 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8648 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-8649 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-8649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-9383 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-9383/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2020-03-31T16:39:32Z",
      "generator": {
        "date": "2020-03-31T16:39:32Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2020:0836-1",
      "initial_release_date": "2020-03-31T16:39:32Z",
      "revision_history": [
        {
          "date": "2020-03-31T16:39:32Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-livepatch-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.aarch64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-devel-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-docs-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-macros-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-source-4.12.14-197.37.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-197.37.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-197.37.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-197.37.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
                  "product_id": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.ppc64le",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-livepatch-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-syms-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-197.37.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.37.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.37.1.s390x",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.37.1.s390x",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.37.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-livepatch-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-debug-livepatch-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-debug-livepatch-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-livepatch-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-livepatch-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
                "product": {
                  "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
                  "product_id": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.x86_64",
                  "product_id": "kernel-vanilla-livepatch-devel-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
                  "product_id": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                  "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-legacy:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-197.37.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-197.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-197.37.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-197.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.12.14-197.37.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch"
        },
        "product_reference": "kernel-docs-4.12.14-197.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-197.37.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-197.37.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP1",
          "product_id": "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
          "product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64"
        },
        "product_reference": "kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.37.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.37.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.12.14-197.37.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP1",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.12.14-197.37.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-19768",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-19768"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-buffer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-19768",
          "url": "https://www.suse.com/security/cve/CVE-2019-19768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1159285 for CVE-2019-19768",
          "url": "https://bugzilla.suse.com/1159285"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-19768"
    },
    {
      "cve": "CVE-2020-8647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8647",
          "url": "https://www.suse.com/security/cve/CVE-2020-8647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1164078 for CVE-2020-8647",
          "url": "https://bugzilla.suse.com/1164078"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8647"
    },
    {
      "cve": "CVE-2020-8648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8648",
          "url": "https://www.suse.com/security/cve/CVE-2020-8648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162928 for CVE-2020-8648",
          "url": "https://bugzilla.suse.com/1162928"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8648"
    },
    {
      "cve": "CVE-2020-8649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-8649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-8649",
          "url": "https://www.suse.com/security/cve/CVE-2020-8649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162929 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162929"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1162931 for CVE-2020-8649",
          "url": "https://bugzilla.suse.com/1162931"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-8649"
    },
    {
      "cve": "CVE-2020-9383",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-9383"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
          "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-9383",
          "url": "https://www.suse.com/security/cve/CVE-2020-9383"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1165111 for CVE-2020-9383",
          "url": "https://bugzilla.suse.com/1165111"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-197_37-default-1-3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-base-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-devel-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-default-man-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-devel-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Basesystem 15 SP1:kernel-macros-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-docs-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-obs-build-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-source-4.12.14-197.37.1.noarch",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP1:kernel-syms-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.aarch64",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.ppc64le",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.s390x",
            "SUSE Linux Enterprise Module for Legacy 15 SP1:reiserfs-kmp-default-4.12.14-197.37.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP1:kernel-default-extra-4.12.14-197.37.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2020-03-31T16:39:32Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-9383"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…