Vulnerability from csaf_suse
Published
2021-09-21 14:28
Modified
2021-09-21 14:28
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115). - CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf->len value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117) - CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172). - CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025). - CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883). - CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832). - CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706). - CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399). - CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400). - CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262). - CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298). - CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292). - CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291). - CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057). - CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983). - CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985). The following non-security bugs were fixed: - ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes). - ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543) - ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543) - ACPI: processor: Export function to claim _CST control (bsc#1175543) - ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543) - ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543) - ALSA: hda - fix the 'Capture Switch' value change notifications (git-fixes). - ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes). - ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes). - ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes). - ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes). - ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes). - ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes). - ALSA: seq: Fix racy deletion of subscriber (git-fixes). - ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes). - ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes). - ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes). - ALSA: usb-audio: fix incorrect clock source setting (git-fixes). - ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes). - ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes). - ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes). - ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes). - ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes). - ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes). - ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes). - ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes). - ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes). - ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes). - ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes). - ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes). - ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes). - ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes). - ASoC: xilinx: Fix reference to PCM buffer address (git-fixes). - Bluetooth: add timeout sanity check to hci_inquiry (git-fixes). - Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes). - Bluetooth: fix repeated calls to sco_sock_kill (git-fixes). - Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes). - Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes). - Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes). - Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543) - Fix breakage of swap over NFS (bsc#1188924). - Fix kabi of prepare_to_wait_exclusive() (bsc#1189575). - HID: i2c-hid: Fix Elan touchpad regression (git-fixes). - HID: input: do not report stylus battery state as 'full' (git-fixes). - KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786). - KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787). - KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788). - KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780). - KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781). - KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782). - KVM: nVMX: Sync unsync'd vmcs02 state to vmcs12 on migration (bsc#1188783). - KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784). - KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790). - Move upstreamed BT fixes into sorted section - NFS: Correct size calculation for create reply length (bsc#1189870). - NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021) - NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes). - NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364). - PCI/MSI: Correct misleading comments (git-fixes). - PCI/MSI: Do not set invalid bits in MSI mask (git-fixes). - PCI/MSI: Enable and mask MSI-X early (git-fixes). - PCI/MSI: Mask all unused MSI-X entries (git-fixes). - PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes). - PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes). - PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes). - PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes). - PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes). - SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202 bsc#1188924). - SUNRPC: Fix the batch tasks count wraparound (git-fixes). - SUNRPC: Should wake up the privileged task firstly (git-fixes). - SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924). - SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924). - SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021). - USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes). - USB: serial: ch341: fix character loss at high transfer rates (git-fixes). - USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes). - USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes). - USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes). - USB: usbtmc: Fix RCU stall warning (git-fixes). - USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes). - VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes). - ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes). - ath9k: Clear key cache explicitly on disabling hardware (git-fixes). - ath: Use safer key clearing with key cache entries (git-fixes). - bcma: Fix memory leak for internally-handled cores (git-fixes). - bdi: Do not use freezable workqueue (bsc#1189573). - blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507). - blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506). - blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503). - blk-wbt: make sure throttle is enabled properly (bsc#1189504). - block: fix trace completion for chained bio (bsc#1189505). - brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes). - btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077). - btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481). - btrfs: add a comment explaining the data flush steps (bsc#1135481). - btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481). - btrfs: add flushing states for handling data reservations (bsc#1135481). - btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481). - btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481). - btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481). - btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481). - btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481). - btrfs: check tickets after waiting on ordered extents (bsc#1135481). - btrfs: do async reclaim for data reservations (bsc#1135481). - btrfs: don't force commit if we are data (bsc#1135481). - btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481). - btrfs: factor out create_chunk() (bsc#1189077). - btrfs: factor out decide_stripe_size() (bsc#1189077). - btrfs: factor out gather_device_info() (bsc#1189077). - btrfs: factor out init_alloc_chunk_ctl (bsc#1189077). - btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077). - btrfs: fix possible infinite loop in data async reclaim (bsc#1135481). - btrfs: flush delayed refs when trying to reserve data space (bsc#1135481). - btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481). - btrfs: handle invalid profile in chunk allocation (bsc#1189077). - btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481). - btrfs: introduce alloc_chunk_ctl (bsc#1189077). - btrfs: introduce chunk allocation policy (bsc#1189077). - btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481). - btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481). - btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077). - btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077). - btrfs: refactor find_free_dev_extent_start() (bsc#1189077). - btrfs: remove orig from shrink_delalloc (bsc#1135481). - btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077). - btrfs: run delayed iputs before committing the transaction for data (bsc#1135481). - btrfs: serialize data reservations if we are flushing (bsc#1135481). - btrfs: shrink delalloc pages instead of full inodes (bsc#1135481). - btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481). - btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481). - btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481). - btrfs: use the same helper for data and metadata reservations (bsc#1135481). - btrfs: use ticketing for data space reservations (bsc#1135481). - can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes). - can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes). - ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468). - ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468). - ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427). - cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes). - cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181). - cgroup: verify that source is a string (bsc#1190131). - cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902). - cifs: avoid starvation when refreshing dfs cache (bsc#1185902). - cifs: constify get_normalized_path() properly (bsc#1185902). - cifs: do not cargo-cult strndup() (bsc#1185902). - cifs: do not send tree disconnect to ipc shares (bsc#1185902). - cifs: do not share tcp servers with dfs mounts (bsc#1185902). - cifs: do not share tcp sessions of dfs connections (bsc#1185902). - cifs: fix check of dfs interlinks (bsc#1185902). - cifs: fix path comparison and hash calc (bsc#1185902). - cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902). - cifs: handle different charsets in dfs cache (bsc#1185902). - cifs: keep referral server sessions alive (bsc#1185902). - cifs: missing null pointer check in cifs_mount (bsc#1185902). - cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902). - cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902). - clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes). - clk: kirkwood: Fix a clocking boot regression (git-fixes). - clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes). - cpuidle: Allow idle states to be disabled by default (bsc#1175543) - cpuidle: Consolidate disabled state checks (bsc#1175543) - cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543) - cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543) - cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543) - cpuidle: cpuidle_state kABI fix (bsc#1175543) - crypto: ccp - Annotate SEV Firmware file names (bsc#1189212). - crypto: qat - use proper type for vf_mask (git-fixes). - crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes). - dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes). - dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes). - dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes). - dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes). - dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes). - dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes). - dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes). - dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes). - drivers/block/null_blk/main: Fix a double free in null_init (git-fixes). - drm/amdgpu/acp: Make PM domain really work (git-fixes). - drm/msi/mdp4: populate priv->kms in mdp4_kms_init (git-fixes). - drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes). - drm/msm/dsi: Fix some reference counted resource leaks (git-fixes). - drm/nouveau/disp: power down unused DP links during init (git-fixes). - drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes). - drm: Copy drm_wait_vblank to user before returning (git-fixes). - ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568). - ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564). - ext4: fix avefreec in find_group_orlov (bsc#1189566). - ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562). - ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576). - ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565). - ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563). - ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567). - fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574). - firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes). - firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes). - fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes). - fpga: xiilnx-spi: Address warning about unused variable (git-fixes). - fpga: zynqmp-fpga: Address warning about unused variable (git-fixes). - gpio: eic-sprd: break loop when getting NULL device resource (git-fixes). - gpio: tqmx86: really make IRQ optional (git-fixes). - i2c: dev: zero out array used for i2c reads from userspace (git-fixes). - i2c: highlander: add IRQ check (git-fixes). - i2c: iop3xx: fix deferred probing (git-fixes). - i2c: mt65xx: fix IRQ check (git-fixes). - i2c: s3c2410: fix IRQ check (git-fixes). - iio: adc: Fix incorrect exit of for-loop (git-fixes). - iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes). - iio: humidity: hdc100x: Add margin to the conversion time (git-fixes). - intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543) - intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543) - intel_idle: Annotate init time data structures (bsc#1175543) - intel_idle: Customize IceLake server support (bsc#1175543) - intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141) - intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543) - intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543) - intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543) - intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543) - intel_idle: Use ACPI _CST on server systems (bsc#1175543) - iommu/amd: Fix extended features logging (bsc#1189213). - iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210). - iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209). - iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214). - iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229). - iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215). - iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216). - iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217). - iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218). - iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219). - iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220). - iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221). - iommu/vt-d: Reject unsupported page request modes (bsc#1189222). - iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes). - kABI fix of usb_dcd_config_params (git-fixes). - kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes). - kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021) - kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924). - kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153). - lib/mpi: use kcalloc in mpi_resize (git-fixes). - libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes). - mac80211: Fix insufficient headroom issue for AMSDU (git-fixes). - mailbox: sti: quieten kernel-doc warnings (git-fixes). - md/raid10: properly indicate failure when ending a failed write request (git-fixes). - media: TDA1997x: enable EDID support (git-fixes). - media: cxd2880-spi: Fix an error handling path (git-fixes). - media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes). - media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes). - media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes). - media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes). - media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes). - media: go7007: fix memory leak in go7007_usb_probe (git-fixes). - media: go7007: remove redundant initialization (git-fixes). - media: rtl28xxu: fix zero-length control request (git-fixes). - media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes). - media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes). - media: videobuf2-core: dequeue if start_streaming fails (git-fixes). - media: zr364xx: fix memory leaks in probe() (git-fixes). - media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes). - memcg: enable accounting for file lock caches (bsc#1190115). - misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes). - misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes). - mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301). - mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569). - mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619). - mmc: dw_mmc: Fix hang on data CRC error (git-fixes). - mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes). - mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes). - mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes). - mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes). - mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes). - mtd: rawnand: cafe: Fix a resource leak in the error handling path of 'cafe_nand_probe()' (git-fixes). - nbd: Aovid double completion of a request (git-fixes). - nbd: Fix NULL pointer in flush_workqueue (git-fixes). - net/mlx5: Properly convey driver version to firmware (git-fixes). - net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes). - net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes). - net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes). - nfs: fix acl memory leak of posix_acl_create() (git-fixes). - nvme-multipath: revalidate paths during rescan (bsc#1187211) - nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972). - nvme-pci: fix NULL req in completion handler (bsc#1181972). - nvme-pci: limit maximum queue depth to 4095 (bsc#1181972). - nvme-pci: use unsigned for io queue depth (bsc#1181972). - nvme-tcp: Do not reset transport on data digest errors (bsc#1188418). - nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972). - nvme: avoid possible double fetch in handling CQE (bsc#1181972). - nvme: code command_id with a genctr for use-after-free validation (bsc#1181972). - nvme: only call synchronize_srcu when clearing current path (bsc#1188067). - nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384). - ocfs2: fix snprintf() checking (bsc#1189581). - ocfs2: fix zero out valid data (bsc#1189579). - ocfs2: initialize ip_next_orphan (bsc#1186731). - ocfs2: issue zeroout to EOF blocks (bsc#1189582). - ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439). - overflow: Correct check_shl_overflow() comment (git-fixes). - ovl: allow upperdir inside lowerdir (bsc#1189323). - ovl: expand warning in ovl_d_real() (bsc#1189323). - ovl: fix missing revert_creds() on error path (bsc#1189323). - ovl: perform vfs_getxattr() with mounter creds (bsc#1189323). - ovl: skip getxattr of security labels (bsc#1189323). - params: lift param_set_uint_minmax to common code (bsc#1181972). - pcmcia: i82092: fix a null pointer dereference bug (git-fixes). - pinctrl: samsung: Fix pinctrl bank pin count (git-fixes). - pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes). - pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes). - platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes). - power: supply: max17042: handle fails of reading status register (git-fixes). - powerpc/papr_scm: Make 'perf_stats' invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes). - powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906). - powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes). - powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes) - powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes). - regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes). - regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes). - regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes). - rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305) - rpm: Abolish image suffix (bsc#1189841). - rpm: Define $certs as rpm macro (bsc#1189841). - rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841). - rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841). - rpm: support gz and zst compression methods Extend commit 18fcdff43a00 ('rpm: support compressed modules') for compression methods other than xz. - rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575). - rsi: fix an error code in rsi_probe() (git-fixes). - rsi: fix error code in rsi_load_9116_firmware() (git-fixes). - s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817). - s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771). - sched/fair: Correctly insert cfs_rq's to list on unthrottle (git-fixes) - sched/rt: Fix RT utilization tracking during policy change (git-fixes) - scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970). - scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970). - scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970). - scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392). - scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650). - scsi: libfc: Fix array index out of bound exception (bsc#1188616). - scsi: lpfc: Add 256 Gb link speed support (bsc#1189385). - scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385). - scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385). - scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385). - scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385). - scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385). - scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385). - scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385). - scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385). - scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385). - scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385). - scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385). - scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385). - scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385). - scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385). - scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385). - scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385). - scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385). - scsi: lpfc: Improve firmware download logging (bsc#1189385). - scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385). - scsi: lpfc: Move initialization of phba->poll_list earlier to avoid crash (git-fixes). - scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385). - scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385). - scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385). - scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385). - scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385). - scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385). - scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385). - scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385). - scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385). - scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385). - scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385). - scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970). - scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970). - scsi: qla2xxx: Add heartbeat check (bsc#1189392). - scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392). - scsi: qla2xxx: Fix spelling mistakes 'allloc' -> 'alloc' (bsc#1189392). - scsi: qla2xxx: Fix use after free in debug code (bsc#1189392). - scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392). - scsi: qla2xxx: Remove duplicate declarations (bsc#1189392). - scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392). - scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392). - scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392). - scsi: qla2xxx: Remove unused variable 'status' (bsc#1189392). - scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392). - scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392). - scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392). - scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392). - scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392). - scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392). - scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392). - scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392). - scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392). - scsi: qla2xxx: edif: Add key update (bsc#1189392). - scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392). - scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392). - scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392). - scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180). - scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392). - scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes). - serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes). - serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes). - serial: tegra: Only print FIFO error message when an error occurs (git-fixes). - slimbus: messaging: check for valid transaction id (git-fixes). - slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes). - slimbus: ngd: reset dma setup during runtime pm (git-fixes). - soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes). - soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes). - soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes). - soc: ixp4xx: fix printing resources (git-fixes). - soc: qcom: rpmhpd: Use corner in power_off (git-fixes). - soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes). - spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes). - spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes). - spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes). - spi: mediatek: Fix fifo transfer (git-fixes). - spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes). - spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes). - spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes). - spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes). - spi: stm32h7: fix full duplex irq handler handling (git-fixes). - staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes). - staging: rtl8712: get rid of flush_scheduled_work (git-fixes). - staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes). - tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes). - tracing / histogram: Give calculation hist_fields a size (git-fixes). - tracing: Reject string operand in the histogram expression (git-fixes). - tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes). - ubifs: Fix error return code in alloc_wbufs() (bsc#1189585). - ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583). - ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455). - ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587). - ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586). - usb: bdc: Fix an error handling path in 'bdc_probe()' when no suitable DMA config is available (git-fixes). - usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes). - usb: dwc3: Add support for DWC_usb32 IP (git-fixes). - usb: dwc3: Disable phy suspend after power-on reset (git-fixes). - usb: dwc3: Separate field holding multiple properties (git-fixes). - usb: dwc3: Stop active transfers before halting the controller (git-fixes). - usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes). - usb: dwc3: Use devres to get clocks (git-fixes). - usb: dwc3: core: Properly default unspecified speed (git-fixes). - usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes). - usb: dwc3: debug: Remove newline printout (git-fixes). - usb: dwc3: gadget: Check MPS of the request length (git-fixes). - usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes). - usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes). - usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes). - usb: dwc3: gadget: Do not send unintended link state change (git-fixes). - usb: dwc3: gadget: Do not setup more than requested (git-fixes). - usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes). - usb: dwc3: gadget: Fix handling ZLP (git-fixes). - usb: dwc3: gadget: Give back staled requests (git-fixes). - usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes). - usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes). - usb: dwc3: gadget: Properly track pending and queued SG (git-fixes). - usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes). - usb: dwc3: gadget: Set BESL config parameter (git-fixes). - usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes). - usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes). - usb: dwc3: gadget: Workaround Mirosoft's BESL check (git-fixes). - usb: dwc3: meson-g12a: add IRQ check (git-fixes). - usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes). - usb: dwc3: of-simple: add a shutdown (git-fixes). - usb: dwc3: st: Add of_dev_put() in probe function (git-fixes). - usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes). - usb: dwc3: support continuous runtime PM with dual role (git-fixes). - usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes). - usb: gadget: Export recommended BESL values (git-fixes). - usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes). - usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes). - usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes). - usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes). - usb: gadget: udc: at91: add IRQ check (git-fixes). - usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes). - usb: host: ohci-tmio: add IRQ check (git-fixes). - usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes). - usb: mtu3: fix the wrong HS mult value (git-fixes). - usb: mtu3: use @mult for HS isoc or intr (git-fixes). - usb: phy: fsl-usb: add IRQ check (git-fixes). - usb: phy: tahvo: add IRQ check (git-fixes). - usb: phy: twl6030: add IRQ checks (git-fixes). - virt_wifi: fix error on connect (git-fixes). - virtio_pci: Support surprise removal of virtio pci device (git-fixes). - wireguard: allowedips: allocate nodes in kmem_cache (git-fixes). - wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes). - wireguard: allowedips: remove nodes in O(1) (git-fixes). - writeback: fix obtain a reference to a freeing memcg css (bsc#1189577). - x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489). - x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489). - x86/fpu: Reset state for all signal restore failures (bsc#1152489). - x86/kvm: fix vcpu-id indexed array sizes (git-fixes). - x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489). - xen/events: Fix race in set_evtchn_to_irq (git-fixes). - xprtrdma: Pad optimization, revisited (bsc#1189760).
Patchnames
SUSE-2021-3178,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3178
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "The SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-3759: Unaccounted ipc objects in Linux kernel could have lead to breaking memcg limits and DoS attacks (bsc#1190115).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-3743: Fixed OOB Read in qrtr_endpoint_post (bsc#1189883).\n- CVE-2021-3739: Fixed a NULL pointer dereference when deleting device by invalid id (bsc#1189832).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3653: Missing validation of the `int_ctl` VMCB field and allows a malicious L1 guest to enable AVIC support for the L2 guest. (bsc#1189399).\n- CVE-2021-3656: Missing validation of the the `virt_ext` VMCB field and allows a malicious L1 guest to disable both VMLOAD/VMSAVE intercepts and VLS for the L2 guest (bsc#1189400).\n- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).\n- CVE-2021-38207: drivers/net/ethernet/xilinx/ll_temac_main.c allowed remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes (bnc#1189298).\n- CVE-2021-38205: drivers/net/ethernet/xilinx/xilinx_emaclite.c made it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer) (bnc#1189292).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-3679: A lack of CPU resource in tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2021-34556: Fixed side-channel attack via a Speculative Store Bypass via unprivileged BPF program that could have obtain sensitive information from kernel memory (bsc#1188983).\n- CVE-2021-35477: Fixed BPF stack frame pointer which could have been abused to disclose content of arbitrary kernel memory (bsc#1188985).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: NFIT: Fix support for virtual SPA ranges (git-fixes).\n- ACPI: processor: Clean up acpi_processor_evaluate_cst() (bsc#1175543)\n- ACPI: processor: Export acpi_processor_evaluate_cst() (bsc#1175543)\n- ACPI: processor: Export function to claim _CST control (bsc#1175543)\n- ACPI: processor: Introduce acpi_processor_evaluate_cst() (bsc#1175543)\n- ACPI: processor: Make ACPI_PROCESSOR_CSTATE depend on ACPI_PROCESSOR (bsc#1175543)\n- ALSA: hda - fix the \u0027Capture Switch\u0027 value change notifications (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9510 laptop (git-fixes).\n- ALSA: hda/realtek: Fix headset mic for Acer SWIFT SF314-56 (ALC256) (git-fixes).\n- ALSA: hda/realtek: add mic quirk for Acer SF314-42 (git-fixes).\n- ALSA: hda/via: Apply runtime PM workaround for ASUS B23E (git-fixes).\n- ALSA: hda: Add quirk for ASUS Flow x13 (git-fixes).\n- ALSA: pcm: fix divide error in snd_pcm_lib_ioctl (git-fixes).\n- ALSA: seq: Fix racy deletion of subscriber (git-fixes).\n- ALSA: usb-audio: Add registration quirk for JBL Quantum 600 (git-fixes).\n- ALSA: usb-audio: Fix regression on Sony WALKMAN NW-A45 DAC (git-fixes).\n- ALSA: usb-audio: Fix superfluous autosuspend recovery (git-fixes).\n- ALSA: usb-audio: fix incorrect clock source setting (git-fixes).\n- ASoC: Intel: Skylake: Leave data as is when invoking TLV IPCs (git-fixes).\n- ASoC: cs42l42: Correct definition of ADC Volume control (git-fixes).\n- ASoC: cs42l42: Do not allow SND_SOC_DAIFMT_LEFT_J (git-fixes).\n- ASoC: cs42l42: Fix LRCLK frame start edge (git-fixes).\n- ASoC: cs42l42: Fix inversion of ADC Notch Switch control (git-fixes).\n- ASoC: cs42l42: Remove duplicate control for WNF filter frequency (git-fixes).\n- ASoC: intel: atom: Fix breakage for PCM buffer address setup (git-fixes).\n- ASoC: intel: atom: Fix reference to PCM buffer address (git-fixes).\n- ASoC: ti: delete some dead code in omap_abe_probe() (git-fixes).\n- ASoC: tlv320aic31xx: Fix jack detection after suspend (git-fixes).\n- ASoC: tlv320aic31xx: fix reversed bclk/wclk master bits (git-fixes).\n- ASoC: wcd9335: Disable irq on slave ports in the remove function (git-fixes).\n- ASoC: wcd9335: Fix a double irq free in the remove function (git-fixes).\n- ASoC: wcd9335: Fix a memory leak in the error handling path of the probe function (git-fixes).\n- ASoC: xilinx: Fix reference to PCM buffer address (git-fixes).\n- Bluetooth: add timeout sanity check to hci_inquiry (git-fixes).\n- Bluetooth: defer cleanup of resources in hci_unregister_dev() (git-fixes).\n- Bluetooth: fix repeated calls to sco_sock_kill (git-fixes).\n- Bluetooth: hidp: use correct wait queue when removing ctrl_wait (git-fixes).\n- Bluetooth: increase BTNAMSIZ to 21 chars to fix potential buffer overflow (git-fixes).\n- Bluetooth: sco: prevent information leak in sco_conn_defer_accept() (git-fixes).\n- Documentation: admin-guide: PM: Add intel_idle document (bsc#1175543)\n- Fix breakage of swap over NFS (bsc#1188924).\n- Fix kabi of prepare_to_wait_exclusive() (bsc#1189575).\n- HID: i2c-hid: Fix Elan touchpad regression (git-fixes).\n- HID: input: do not report stylus battery state as \u0027full\u0027 (git-fixes).\n- KVM: VMX: Drop guest CPUID check for VMXE in vmx_set_cr4() (bsc#1188786).\n- KVM: VMX: Enable machine check support for 32bit targets (bsc#1188787).\n- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (bsc#1188788).\n- KVM: nVMX: Really make emulated nested preemption timer pinned (bsc#1188780).\n- KVM: nVMX: Reset the segment cache when stuffing guest segs (bsc#1188781).\n- KVM: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1188782).\n- KVM: nVMX: Sync unsync\u0027d vmcs02 state to vmcs12 on migration (bsc#1188783).\n- KVM: nVMX: Truncate bits 63:32 of VMCS field on nested check in !64-bit (bsc#1188784).\n- KVM: x86: bit 8 of non-leaf PDPEs is not reserved (bsc#1188790).\n- Move upstreamed BT fixes into sorted section\n- NFS: Correct size calculation for create reply length (bsc#1189870).\n- NFSv4.1: Do not rebind to the same source port when (bnc#1186264 bnc#1189021)\n- NFSv4/pNFS: Do not call _nfs4_pnfs_v3_ds_connect multiple times (git-fixes).\n- NFSv4: Initialise connection to the server in nfs4_alloc_client() (bsc#1040364).\n- PCI/MSI: Correct misleading comments (git-fixes).\n- PCI/MSI: Do not set invalid bits in MSI mask (git-fixes).\n- PCI/MSI: Enable and mask MSI-X early (git-fixes).\n- PCI/MSI: Mask all unused MSI-X entries (git-fixes).\n- PCI/MSI: Skip masking MSI-X on Xen PV (git-fixes).\n- PCI/MSI: Use msi_mask_irq() in pci_msi_shutdown() (git-fixes).\n- PCI: Increase D3 delay for AMD Renoir/Cezanne XHCI (git-fixes).\n- PCI: PM: Avoid forcing PCI_D0 for wakeup reasons inconsistently (git-fixes).\n- PCI: PM: Enable PME if it can be signaled from D3cold (git-fixes).\n- SUNRPC: \u0027Directory with parent \u0027rpc_clnt\u0027 already present!\u0027 (bsc#1168202 bsc#1188924).\n- SUNRPC: Fix the batch tasks count wraparound (git-fixes).\n- SUNRPC: Should wake up the privileged task firstly (git-fixes).\n- SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).\n- SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202 bsc#1188924).\n- SUNRPC: prevent port reuse on transports which do not request it (bnc#1186264 bnc#1189021).\n- USB: core: Avoid WARNings for 0-length descriptor requests (git-fixes).\n- USB: serial: ch341: fix character loss at high transfer rates (git-fixes).\n- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2 (git-fixes).\n- USB: serial: option: add Telit FD980 composition 0x1056 (git-fixes).\n- USB: serial: option: add new VID/PID to support Fibocom FG150 (git-fixes).\n- USB: usbtmc: Fix RCU stall warning (git-fixes).\n- USB:ehci:fix Kunpeng920 ehci hardware problem (git-fixes).\n- VMCI: fix NULL pointer dereference when unmapping queue pair (git-fixes).\n- ath6kl: wmi: fix an error code in ath6kl_wmi_sync_point() (git-fixes).\n- ath9k: Clear key cache explicitly on disabling hardware (git-fixes).\n- ath: Use safer key clearing with key cache entries (git-fixes).\n- bcma: Fix memory leak for internally-handled cores (git-fixes).\n- bdi: Do not use freezable workqueue (bsc#1189573).\n- blk-iolatency: error out if blk_get_queue() failed in iolatency_set_limit() (bsc#1189507).\n- blk-mq-sched: Fix blk_mq_sched_alloc_tags() error handling (bsc#1189506).\n- blk-wbt: introduce a new disable state to prevent false positive by rwb_enabled() (bsc#1189503).\n- blk-wbt: make sure throttle is enabled properly (bsc#1189504).\n- block: fix trace completion for chained bio (bsc#1189505).\n- brcmfmac: pcie: fix oops on failure to resume and reprobe (git-fixes).\n- btrfs: Rename __btrfs_alloc_chunk to btrfs_alloc_chunk (bsc#1189077).\n- btrfs: account for new extents being deleted in total_bytes_pinned (bsc#1135481).\n- btrfs: add a comment explaining the data flush steps (bsc#1135481).\n- btrfs: add btrfs_reserve_data_bytes and use it (bsc#1135481).\n- btrfs: add flushing states for handling data reservations (bsc#1135481).\n- btrfs: add the data transaction commit logic into may_commit_transaction (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when freeing reserved bytes (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when reserving space (bsc#1135481).\n- btrfs: call btrfs_try_granting_tickets when unpinning anything (bsc#1135481).\n- btrfs: change nr to u64 in btrfs_start_delalloc_roots (bsc#1135481).\n- btrfs: check tickets after waiting on ordered extents (bsc#1135481).\n- btrfs: do async reclaim for data reservations (bsc#1135481).\n- btrfs: don\u0027t force commit if we are data (bsc#1135481).\n- btrfs: drop the commit_cycles stuff for data reservations (bsc#1135481).\n- btrfs: factor out create_chunk() (bsc#1189077).\n- btrfs: factor out decide_stripe_size() (bsc#1189077).\n- btrfs: factor out gather_device_info() (bsc#1189077).\n- btrfs: factor out init_alloc_chunk_ctl (bsc#1189077).\n- btrfs: fix deadlock with concurrent chunk allocations involving system chunks (bsc#1189077).\n- btrfs: fix possible infinite loop in data async reclaim (bsc#1135481).\n- btrfs: flush delayed refs when trying to reserve data space (bsc#1135481).\n- btrfs: handle U64_MAX for shrink_delalloc (bsc#1135481).\n- btrfs: handle invalid profile in chunk allocation (bsc#1189077).\n- btrfs: handle space_info::total_bytes_pinned inside the delayed ref itself (bsc#1135481).\n- btrfs: introduce alloc_chunk_ctl (bsc#1189077).\n- btrfs: introduce chunk allocation policy (bsc#1189077).\n- btrfs: make ALLOC_CHUNK use the space info flags (bsc#1135481).\n- btrfs: make shrink_delalloc take space_info as an arg (bsc#1135481).\n- btrfs: move the chunk_mutex in btrfs_read_chunk_tree (bsc#1189077).\n- btrfs: parameterize dev_extent_min for chunk allocation (bsc#1189077).\n- btrfs: refactor find_free_dev_extent_start() (bsc#1189077).\n- btrfs: remove orig from shrink_delalloc (bsc#1135481).\n- btrfs: rework chunk allocation to avoid exhaustion of the system chunk array (bsc#1189077).\n- btrfs: run delayed iputs before committing the transaction for data (bsc#1135481).\n- btrfs: serialize data reservations if we are flushing (bsc#1135481).\n- btrfs: shrink delalloc pages instead of full inodes (bsc#1135481).\n- btrfs: track ordered bytes instead of just dio ordered bytes (bsc#1135481).\n- btrfs: use btrfs_start_delalloc_roots in shrink_delalloc (bsc#1135481).\n- btrfs: use the btrfs_space_info_free_bytes_may_use helper for delalloc (bsc#1135481).\n- btrfs: use the same helper for data and metadata reservations (bsc#1135481).\n- btrfs: use ticketing for data space reservations (bsc#1135481).\n- can: ti_hecc: Fix memleak in ti_hecc_probe (git-fixes).\n- can: usb: esd_usb2: esd_usb2_rx_event(): fix the interchange of the CAN RX and TX error counters (git-fixes).\n- ceph: clean up and optimize ceph_check_delayed_caps() (bsc#1187468).\n- ceph: reduce contention in ceph_check_delayed_caps() (bsc#1187468).\n- ceph: take snap_empty_lock atomically with snaprealm refcount change (bsc#1189427).\n- cfg80211: Fix possible memory leak in function cfg80211_bss_update (git-fixes).\n- cgroup1: fix leaked context root causing sporadic NULL deref in LTP (bsc#1190181).\n- cgroup: verify that source is a string (bsc#1190131).\n- cifs: Remove unused inline function is_sysvol_or_netlogon() (bsc#1185902).\n- cifs: avoid starvation when refreshing dfs cache (bsc#1185902).\n- cifs: constify get_normalized_path() properly (bsc#1185902).\n- cifs: do not cargo-cult strndup() (bsc#1185902).\n- cifs: do not send tree disconnect to ipc shares (bsc#1185902).\n- cifs: do not share tcp servers with dfs mounts (bsc#1185902).\n- cifs: do not share tcp sessions of dfs connections (bsc#1185902).\n- cifs: fix check of dfs interlinks (bsc#1185902).\n- cifs: fix path comparison and hash calc (bsc#1185902).\n- cifs: get rid of @noreq param in __dfs_cache_find() (bsc#1185902).\n- cifs: handle different charsets in dfs cache (bsc#1185902).\n- cifs: keep referral server sessions alive (bsc#1185902).\n- cifs: missing null pointer check in cifs_mount (bsc#1185902).\n- cifs: prevent NULL deref in cifs_compose_mount_options() (bsc#1185902).\n- cifs: set a minimum of 2 minutes for refreshing dfs cache (bsc#1185902).\n- clk: fix leak on devm_clk_bulk_get_all() unwind (git-fixes).\n- clk: kirkwood: Fix a clocking boot regression (git-fixes).\n- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs (git-fixes).\n- cpuidle: Allow idle states to be disabled by default (bsc#1175543)\n- cpuidle: Consolidate disabled state checks (bsc#1175543)\n- cpuidle: Drop disabled field from struct cpuidle_state (bsc#1175543)\n- cpuidle: Fix cpuidle_driver_state_disabled() (bsc#1175543)\n- cpuidle: Introduce cpuidle_driver_state_disabled() for driver quirks (bsc#1175543)\n- cpuidle: cpuidle_state kABI fix (bsc#1175543)\n- crypto: ccp - Annotate SEV Firmware file names (bsc#1189212).\n- crypto: qat - use proper type for vf_mask (git-fixes).\n- crypto: x86/curve25519 - fix cpu feature checking logic in mod_exit (git-fixes).\n- dm integrity: fix missing goto in bitmap_flush_interval error handling (git-fixes).\n- dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (git-fixes).\n- dm verity: fix DM_VERITY_OPTS_MAX value (git-fixes).\n- dmaengine: imx-dma: configure the generic DMA type to make it work (git-fixes).\n- dmaengine: imx-sdma: remove duplicated sdma_load_context (git-fixes).\n- dmaengine: of-dma: router_xlate to return -EPROBE_DEFER if controller is not yet available (git-fixes).\n- dmaengine: usb-dmac: Fix PM reference leak in usb_dmac_probe() (git-fixes).\n- dmaengine: xilinx_dma: Fix read-after-free bug when terminating transfers (git-fixes).\n- drivers/block/null_blk/main: Fix a double free in null_init (git-fixes).\n- drm/amdgpu/acp: Make PM domain really work (git-fixes).\n- drm/msi/mdp4: populate priv-\u003ekms in mdp4_kms_init (git-fixes).\n- drm/msm/dpu: make dpu_hw_ctl_clear_all_blendstages clear necessary LMs (git-fixes).\n- drm/msm/dsi: Fix some reference counted resource leaks (git-fixes).\n- drm/nouveau/disp: power down unused DP links during init (git-fixes).\n- drm/panfrost: Fix missing clk_disable_unprepare() on error in panfrost_clk_init() (git-fixes).\n- drm: Copy drm_wait_vblank to user before returning (git-fixes).\n- ext4: cleanup in-core orphan list if ext4_truncate() failed to get a transaction handle (bsc#1189568).\n- ext4: correct the cache_nr in tracepoint ext4_es_shrink_exit (bsc#1189564).\n- ext4: fix avefreec in find_group_orlov (bsc#1189566).\n- ext4: fix kernel infoleak via ext4_extent_header (bsc#1189562).\n- ext4: fix potential htree corruption when growing large_dir directories (bsc#1189576).\n- ext4: remove check for zero nr_to_scan in ext4_es_scan() (bsc#1189565).\n- ext4: return error code when ext4_fill_flex_info() fails (bsc#1189563).\n- ext4: use ext4_grp_locked_error in mb_find_extent (bsc#1189567).\n- fanotify: fix copy_event_to_user() fid error clean up (bsc#1189574).\n- firmware_loader: fix use-after-free in firmware_fallback_sysfs (git-fixes).\n- firmware_loader: use -ETIMEDOUT instead of -EAGAIN in fw_load_sysfs_fallback (git-fixes).\n- fpga: altera-freeze-bridge: Address warning about unused variable (git-fixes).\n- fpga: xiilnx-spi: Address warning about unused variable (git-fixes).\n- fpga: zynqmp-fpga: Address warning about unused variable (git-fixes).\n- gpio: eic-sprd: break loop when getting NULL device resource (git-fixes).\n- gpio: tqmx86: really make IRQ optional (git-fixes).\n- i2c: dev: zero out array used for i2c reads from userspace (git-fixes).\n- i2c: highlander: add IRQ check (git-fixes).\n- i2c: iop3xx: fix deferred probing (git-fixes).\n- i2c: mt65xx: fix IRQ check (git-fixes).\n- i2c: s3c2410: fix IRQ check (git-fixes).\n- iio: adc: Fix incorrect exit of for-loop (git-fixes).\n- iio: adc: ti-ads7950: Ensure CS is deasserted after reading channels (git-fixes).\n- iio: humidity: hdc100x: Add margin to the conversion time (git-fixes).\n- intel_idle: Add module parameter to prevent ACPI _CST from being used (bsc#1175543)\n- intel_idle: Allow ACPI _CST to be used for selected known processors (bsc#1175543)\n- intel_idle: Annotate init time data structures (bsc#1175543)\n- intel_idle: Customize IceLake server support (bsc#1175543)\n- intel_idle: Disable ACPI _CST on Haswell (bsc#1175543, bsc#1177399, bsc#1180347, bsc#1180141)\n- intel_idle: Fix max_cstate for processor models without C-state tables (bsc#1175543)\n- intel_idle: Ignore _CST if control cannot be taken from the platform (bsc#1175543)\n- intel_idle: Refactor intel_idle_cpuidle_driver_init() (bsc#1175543)\n- intel_idle: Use ACPI _CST for processor models without C-state tables (bsc#1175543)\n- intel_idle: Use ACPI _CST on server systems (bsc#1175543)\n- iommu/amd: Fix extended features logging (bsc#1189213).\n- iommu/arm-smmu-v3: Decrease the queue size of evtq and priq (bsc#1189210).\n- iommu/arm-smmu-v3: add bit field SFM into GERROR_ERR_MASK (bsc#1189209).\n- iommu/dma: Fix IOVA reserve dma ranges (bsc#1189214).\n- iommu/dma: Fix compile warning in 32-bit builds (bsc#1189229).\n- iommu/vt-d: Check for allocation failure in aux_detach_device() (bsc#1189215).\n- iommu/vt-d: Define counter explicitly as unsigned int (bsc#1189216).\n- iommu/vt-d: Do not set then clear private data in prq_event_thread() (bsc#1189217).\n- iommu/vt-d: Fix sysfs leak in alloc_iommu() (bsc#1189218).\n- iommu/vt-d: Force to flush iotlb before creating superpage (bsc#1189219).\n- iommu/vt-d: Global devTLB flush when present context entry changed (bsc#1189220).\n- iommu/vt-d: Invalidate PASID cache when root/context entry changed (bsc#1189221).\n- iommu/vt-d: Reject unsupported page request modes (bsc#1189222).\n- iwlwifi: rs-fw: do not support stbc for HE 160 (git-fixes).\n- kABI fix of usb_dcd_config_params (git-fixes).\n- kABI: Fix kABI after fixing vcpu-id indexed arrays (git-fixes).\n- kabi fix for NFSv4.1: Do not rebind to the same source port when reconnecting to the server (bnc#1186264 bnc#1189021)\n- kabi fix for SUNRPC: defer slow parts of rpc_free_client() to a workqueue (bsc#1168202 bsc#1188924).\n- kernel, fs: Introduce and use set_restart_fn() and arch_set_restart_data() (bsc#1189153).\n- lib/mpi: use kcalloc in mpi_resize (git-fixes).\n- libata: fix ata_pio_sector for CONFIG_HIGHMEM (git-fixes).\n- mac80211: Fix insufficient headroom issue for AMSDU (git-fixes).\n- mailbox: sti: quieten kernel-doc warnings (git-fixes).\n- md/raid10: properly indicate failure when ending a failed write request (git-fixes).\n- media: TDA1997x: enable EDID support (git-fixes).\n- media: cxd2880-spi: Fix an error handling path (git-fixes).\n- media: drivers/media/usb: fix memory leak in zr364xx_probe (git-fixes).\n- media: dvb-usb: Fix error handling in dvb_usb_i2c_init (git-fixes).\n- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).\n- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).\n- media: em28xx-input: fix refcount bug in em28xx_usb_disconnect (git-fixes).\n- media: go7007: fix memory leak in go7007_usb_probe (git-fixes).\n- media: go7007: remove redundant initialization (git-fixes).\n- media: rtl28xxu: fix zero-length control request (git-fixes).\n- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).\n- media: venus: venc: Fix potential null pointer dereference on pointer fmt (git-fixes).\n- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).\n- media: zr364xx: fix memory leaks in probe() (git-fixes).\n- media: zr364xx: propagate errors from zr364xx_start_readpipe() (git-fixes).\n- memcg: enable accounting for file lock caches (bsc#1190115).\n- misc: atmel-ssc: lock with mutex instead of spinlock (git-fixes).\n- misc: rtsx: do not setting OC_POWER_DOWN reg in rtsx_pci_init_ocp() (git-fixes).\n- mm, vmscan: guarantee drop_slab_node() termination (VM Functionality, bsc#1189301).\n- mm/thp: unmap_mapping_page() to fix THP truncate_cleanup_page() (bsc#1189569).\n- mm: swap: properly update readahead statistics in unuse_pte_range() (bsc#1187619).\n- mmc: dw_mmc: Fix hang on data CRC error (git-fixes).\n- mmc: dw_mmc: Fix issue with uninitialized dma_slave_config (git-fixes).\n- mmc: moxart: Fix issue with uninitialized dma_slave_config (git-fixes).\n- mmc: sdhci-iproc: Cap min clock frequency on BCM2711 (git-fixes).\n- mmc: sdhci-iproc: Set SDHCI_QUIRK_CAP_CLOCK_BASE_BROKEN on BCM2711 (git-fixes).\n- mtd: cfi_cmdset_0002: fix crash when erasing/writing AMD cards (git-fixes).\n- mtd: rawnand: cafe: Fix a resource leak in the error handling path of \u0027cafe_nand_probe()\u0027 (git-fixes).\n- nbd: Aovid double completion of a request (git-fixes).\n- nbd: Fix NULL pointer in flush_workqueue (git-fixes).\n- net/mlx5: Properly convey driver version to firmware (git-fixes).\n- net: dsa: mv88e6xxx: Avoid VTU corruption on 6097 (git-fixes).\n- net: dsa: mv88e6xxx: also read STU state in mv88e6250_g1_vtu_getnext (git-fixes).\n- net: stmmac: free tx skb buffer in stmmac_resume() (git-fixes).\n- nfs: fix acl memory leak of posix_acl_create() (git-fixes).\n- nvme-multipath: revalidate paths during rescan (bsc#1187211)\n- nvme-pci: Use u32 for nvme_dev.q_depth and nvme_queue.q_depth (bsc#1181972).\n- nvme-pci: fix NULL req in completion handler (bsc#1181972).\n- nvme-pci: limit maximum queue depth to 4095 (bsc#1181972).\n- nvme-pci: use unsigned for io queue depth (bsc#1181972).\n- nvme-tcp: Do not reset transport on data digest errors (bsc#1188418).\n- nvme-tcp: do not check blk_mq_tag_to_rq when receiving pdu data (bsc#1181972).\n- nvme: avoid possible double fetch in handling CQE (bsc#1181972).\n- nvme: code command_id with a genctr for use-after-free validation (bsc#1181972).\n- nvme: only call synchronize_srcu when clearing current path (bsc#1188067).\n- nvmet: use NVMET_MAX_NAMESPACES to set nn value (bsc#1189384).\n- ocfs2: fix snprintf() checking (bsc#1189581).\n- ocfs2: fix zero out valid data (bsc#1189579).\n- ocfs2: initialize ip_next_orphan (bsc#1186731).\n- ocfs2: issue zeroout to EOF blocks (bsc#1189582).\n- ocfs2: ocfs2_downconvert_lock failure results in deadlock (bsc#1188439).\n- overflow: Correct check_shl_overflow() comment (git-fixes).\n- ovl: allow upperdir inside lowerdir (bsc#1189323).\n- ovl: expand warning in ovl_d_real() (bsc#1189323).\n- ovl: fix missing revert_creds() on error path (bsc#1189323).\n- ovl: perform vfs_getxattr() with mounter creds (bsc#1189323).\n- ovl: skip getxattr of security labels (bsc#1189323).\n- params: lift param_set_uint_minmax to common code (bsc#1181972).\n- pcmcia: i82092: fix a null pointer dereference bug (git-fixes).\n- pinctrl: samsung: Fix pinctrl bank pin count (git-fixes).\n- pinctrl: single: Fix error return code in pcs_parse_bits_in_pinctrl_entry() (git-fixes).\n- pinctrl: stmfx: Fix hazardous u8[] to unsigned long cast (git-fixes).\n- platform/x86: pcengines-apuv2: Add missing terminating entries to gpio-lookup tables (git-fixes).\n- power: supply: max17042: handle fails of reading status register (git-fixes).\n- powerpc/papr_scm: Make \u0027perf_stats\u0027 invisible if perf-stats unavailable (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769 git-fixes).\n- powerpc/papr_scm: Reduce error severity if nvdimm stats inaccessible (bsc#1189197 ltc#193906).\n- powerpc/pseries: Fix regression while building external modules (bsc#1160010 ltc#183046 git-fixes).\n- powerpc/pseries: Fix update of LPAR security flavor after LPM (bsc#1188885 ltc#193722 git-fixes)\n- powerpc: Fix is_kvm_guest() / kvm_para_available() (bsc#1181148 ltc#190702 git-fixes).\n- regulator: rt5033: Fix n_voltages settings for BUCK and LDO (git-fixes).\n- regulator: vctrl: Avoid lockdep warning in enable/disable ops (git-fixes).\n- regulator: vctrl: Use locked regulator_get_voltage in probe path (git-fixes).\n- rpm/kernel-obs-build.spec.in: make builds reproducible (bsc#1189305)\n- rpm: Abolish image suffix (bsc#1189841).\n- rpm: Define $certs as rpm macro (bsc#1189841).\n- rpm: Fold kernel-devel and kernel-source scriptlets into spec files (bsc#1189841).\n- rpm: kernel-binary.spec: Define $image as rpm macro (bsc#1189841).\n- rpm: support gz and zst compression methods Extend commit 18fcdff43a00 (\u0027rpm: support compressed modules\u0027) for compression methods other than xz.\n- rq-qos: fix missed wake-ups in rq_qos_throttle try two (bsc#1189575).\n- rsi: fix an error code in rsi_probe() (git-fixes).\n- rsi: fix error code in rsi_load_9116_firmware() (git-fixes).\n- s390/ap: Fix hanging ioctl caused by wrong msg counter (bsc#1188982 LTC#193817).\n- s390/boot: fix use of expolines in the DMA code (bsc#1188878 ltc#193771).\n- sched/fair: Correctly insert cfs_rq\u0027s to list on unthrottle (git-fixes)\n- sched/rt: Fix RT utilization tracking during policy change (git-fixes)\n- scsi: blkcg: Add app identifier support for blkcg (bsc#1189385 jsc#SLE-18970).\n- scsi: blkcg: Fix application ID config options (bsc#1189385 jsc#SLE-18970).\n- scsi: cgroup: Add cgroup_get_from_id() (bsc#1189385 jsc#SLE-18970).\n- scsi: core: Add scsi_prot_ref_tag() helper (bsc#1189392).\n- scsi: ibmvfc: Do not wait for initial device scan (bsc#1127650).\n- scsi: libfc: Fix array index out of bound exception (bsc#1188616).\n- scsi: lpfc: Add 256 Gb link speed support (bsc#1189385).\n- scsi: lpfc: Add PCI ID support for LPe37000/LPe38000 series adapters (bsc#1189385).\n- scsi: lpfc: Call discovery state machine when handling PLOGI/ADISC completions (bsc#1189385).\n- scsi: lpfc: Clear outstanding active mailbox during PCI function reset (bsc#1189385).\n- scsi: lpfc: Copyright updates for 12.8.0.11 patches (bsc#1189385).\n- scsi: lpfc: Copyright updates for 14.0.0.0 patches (bsc#1189385).\n- scsi: lpfc: Delay unregistering from transport until GIDFT or ADISC completes (bsc#1189385).\n- scsi: lpfc: Discovery state machine fixes for LOGO handling (bsc#1189385).\n- scsi: lpfc: Enable adisc discovery after RSCN by default (bsc#1189385).\n- scsi: lpfc: Fix KASAN slab-out-of-bounds in lpfc_unreg_rpi() routine (bsc#1189385).\n- scsi: lpfc: Fix NULL ptr dereference with NPIV ports for RDF handling (bsc#1189385).\n- scsi: lpfc: Fix NVMe support reporting in log message (bsc#1189385).\n- scsi: lpfc: Fix build error in lpfc_scsi.c (bsc#1189385).\n- scsi: lpfc: Fix cq_id truncation in rq create (bsc#1189385).\n- scsi: lpfc: Fix function description comments for vmid routines (bsc#1189385).\n- scsi: lpfc: Fix memory leaks in error paths while issuing ELS RDF/SCR request (bsc#1189385).\n- scsi: lpfc: Fix possible ABBA deadlock in nvmet_xri_aborted() (bsc#1189385).\n- scsi: lpfc: Fix target reset handler from falsely returning FAILURE (bsc#1189385).\n- scsi: lpfc: Improve firmware download logging (bsc#1189385).\n- scsi: lpfc: Keep NDLP reference until after freeing the IOCB after ELS handling (bsc#1189385).\n- scsi: lpfc: Move initialization of phba-\u003epoll_list earlier to avoid crash (git-fixes).\n- scsi: lpfc: Remove REG_LOGIN check requirement to issue an ELS RDF (bsc#1189385).\n- scsi: lpfc: Remove redundant assignment to pointer pcmd (bsc#1189385).\n- scsi: lpfc: Remove redundant assignment to pointer temp_hdr (bsc#1189385).\n- scsi: lpfc: Remove use of kmalloc() in trace event logging (bsc#1189385).\n- scsi: lpfc: Revise Topology and RAS support checks for new adapters (bsc#1189385).\n- scsi: lpfc: Skip issuing ADISC when node is in NPR state (bsc#1189385).\n- scsi: lpfc: Skip reg_vpi when link is down for SLI3 in ADISC cmpl path (bsc#1189385).\n- scsi: lpfc: Update lpfc version to 12.8.0.11 (bsc#1189385).\n- scsi: lpfc: Update lpfc version to 14.0.0.0 (bsc#1189385).\n- scsi: lpfc: Use PBDE feature enabled bit to determine PBDE support (bsc#1189385).\n- scsi: lpfc: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189385).\n- scsi: lpfc: vmid: Add QFPA and VMID timeout check in worker thread (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Add datastructure for supporting VMID in lpfc (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Add support for VMID in mailbox command (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Append the VMID to the wqe before sending (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Functions to manage VMIDs (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Implement CT commands for appid (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Implement ELS commands for appid (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Introduce VMID in I/O path (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: Timeout implementation for VMID (bsc#1189385 jsc#SLE-18970).\n- scsi: lpfc: vmid: VMID parameter initialization (bsc#1189385 jsc#SLE-18970).\n- scsi: qla2xxx: Add heartbeat check (bsc#1189392).\n- scsi: qla2xxx: Fix error return code in qla82xx_write_flash_dword() (bsc#1189392).\n- scsi: qla2xxx: Fix spelling mistakes \u0027allloc\u0027 -\u003e \u0027alloc\u0027 (bsc#1189392).\n- scsi: qla2xxx: Fix use after free in debug code (bsc#1189392).\n- scsi: qla2xxx: Log PCI address in qla_nvme_unregister_remote_port() (bsc#1189392).\n- scsi: qla2xxx: Remove duplicate declarations (bsc#1189392).\n- scsi: qla2xxx: Remove redundant assignment to rval (bsc#1189392).\n- scsi: qla2xxx: Remove redundant continue statement in a for-loop (bsc#1189392).\n- scsi: qla2xxx: Remove redundant initialization of variable num_cnt (bsc#1189392).\n- scsi: qla2xxx: Remove unused variable \u0027status\u0027 (bsc#1189392).\n- scsi: qla2xxx: Update version to 10.02.00.107-k (bsc#1189392).\n- scsi: qla2xxx: Use list_move_tail() instead of list_del()/list_add_tail() (bsc#1189392).\n- scsi: qla2xxx: Use the proper SCSI midlayer interfaces for PI (bsc#1189392).\n- scsi: qla2xxx: edif: Add authentication pass + fail bsgs (bsc#1189392).\n- scsi: qla2xxx: edif: Add detection of secure device (bsc#1189392).\n- scsi: qla2xxx: edif: Add doorbell notification for app (bsc#1189392).\n- scsi: qla2xxx: edif: Add encryption to I/O path (bsc#1189392).\n- scsi: qla2xxx: edif: Add extraction of auth_els from the wire (bsc#1189392).\n- scsi: qla2xxx: edif: Add getfcinfo and statistic bsgs (bsc#1189392).\n- scsi: qla2xxx: edif: Add key update (bsc#1189392).\n- scsi: qla2xxx: edif: Add send, receive, and accept for auth_els (bsc#1189392).\n- scsi: qla2xxx: edif: Add start + stop bsgs (bsc#1189392).\n- scsi: qla2xxx: edif: Increment command and completion counts (bsc#1189392).\n- scsi: scsi_transport_srp: Do not block target in SRP_PORT_LOST state (bsc#1184180).\n- scsi: target: qla2xxx: Wait for stop_phase1 at WWN removal (bsc#1189392).\n- scsi: zfcp: Report port fc_security as unknown early during remote cable pull (git-fixes).\n- serial: 8250: Mask out floating 16/32-bit bus bits (git-fixes).\n- serial: 8250_mtk: fix uart corruption issue when rx power off (git-fixes).\n- serial: tegra: Only print FIFO error message when an error occurs (git-fixes).\n- slimbus: messaging: check for valid transaction id (git-fixes).\n- slimbus: messaging: start transaction ids from 1 instead of zero (git-fixes).\n- slimbus: ngd: reset dma setup during runtime pm (git-fixes).\n- soc: aspeed: lpc-ctrl: Fix boundary check for mmap (git-fixes).\n- soc: aspeed: p2a-ctrl: Fix boundary check for mmap (git-fixes).\n- soc: ixp4xx/qmgr: fix invalid __iomem access (git-fixes).\n- soc: ixp4xx: fix printing resources (git-fixes).\n- soc: qcom: rpmhpd: Use corner in power_off (git-fixes).\n- soc: qcom: smsm: Fix missed interrupts if state changes while masked (git-fixes).\n- spi: imx: mx51-ecspi: Fix CONFIGREG delay comment (git-fixes).\n- spi: imx: mx51-ecspi: Fix low-speed CONFIGREG delay calculation (git-fixes).\n- spi: imx: mx51-ecspi: Reinstate low-speed CONFIGREG delay (git-fixes).\n- spi: mediatek: Fix fifo transfer (git-fixes).\n- spi: meson-spicc: fix memory leak in meson_spicc_remove (git-fixes).\n- spi: spi-fsl-dspi: Fix issue with uninitialized dma_slave_config (git-fixes).\n- spi: spi-pic32: Fix issue with uninitialized dma_slave_config (git-fixes).\n- spi: sprd: Fix the wrong WDG_LOAD_VAL (git-fixes).\n- spi: stm32h7: fix full duplex irq handler handling (git-fixes).\n- staging: rtl8192u: Fix bitwise vs logical operator in TranslateRxSignalStuff819xUsb() (git-fixes).\n- staging: rtl8712: get rid of flush_scheduled_work (git-fixes).\n- staging: rtl8723bs: Fix a resource leak in sd_int_dpc (git-fixes).\n- tracing / histogram: Fix NULL pointer dereference on strcmp() on NULL event name (git-fixes).\n- tracing / histogram: Give calculation hist_fields a size (git-fixes).\n- tracing: Reject string operand in the histogram expression (git-fixes).\n- tty: serial: fsl_lpuart: fix the wrong mapbase value (git-fixes).\n- ubifs: Fix error return code in alloc_wbufs() (bsc#1189585).\n- ubifs: Fix memleak in ubifs_init_authentication (bsc#1189583).\n- ubifs: Only check replay with inode type to judge if inode linked (bsc#1187455).\n- ubifs: Set/Clear I_LINKABLE under i_lock for whiteout inode (bsc#1189587).\n- ubifs: journal: Fix error return code in ubifs_jnl_write_inode() (bsc#1189586).\n- usb: bdc: Fix an error handling path in \u0027bdc_probe()\u0027 when no suitable DMA config is available (git-fixes).\n- usb: dwc2: Postponed gadget registration to the udc class driver (git-fixes).\n- usb: dwc3: Add support for DWC_usb32 IP (git-fixes).\n- usb: dwc3: Disable phy suspend after power-on reset (git-fixes).\n- usb: dwc3: Separate field holding multiple properties (git-fixes).\n- usb: dwc3: Stop active transfers before halting the controller (git-fixes).\n- usb: dwc3: Use clk_bulk_prepare_enable() (git-fixes).\n- usb: dwc3: Use devres to get clocks (git-fixes).\n- usb: dwc3: core: Properly default unspecified speed (git-fixes).\n- usb: dwc3: core: do not do suspend for device mode if already suspended (git-fixes).\n- usb: dwc3: debug: Remove newline printout (git-fixes).\n- usb: dwc3: gadget: Check MPS of the request length (git-fixes).\n- usb: dwc3: gadget: Clear DCTL.ULSTCHNGREQ before set (git-fixes).\n- usb: dwc3: gadget: Clear DEP flags after stop transfers in ep disable (git-fixes).\n- usb: dwc3: gadget: Disable gadget IRQ during pullup disable (git-fixes).\n- usb: dwc3: gadget: Do not send unintended link state change (git-fixes).\n- usb: dwc3: gadget: Do not setup more than requested (git-fixes).\n- usb: dwc3: gadget: Fix dwc3_calc_trbs_left() (git-fixes).\n- usb: dwc3: gadget: Fix handling ZLP (git-fixes).\n- usb: dwc3: gadget: Give back staled requests (git-fixes).\n- usb: dwc3: gadget: Handle ZLP for sg requests (git-fixes).\n- usb: dwc3: gadget: Prevent EP queuing while stopping transfers (git-fixes).\n- usb: dwc3: gadget: Properly track pending and queued SG (git-fixes).\n- usb: dwc3: gadget: Restart DWC3 gadget when enabling pullup (git-fixes).\n- usb: dwc3: gadget: Set BESL config parameter (git-fixes).\n- usb: dwc3: gadget: Set link state to RX_Detect on disconnect (git-fixes).\n- usb: dwc3: gadget: Stop EP0 transfers during pullup disable (git-fixes).\n- usb: dwc3: gadget: Workaround Mirosoft\u0027s BESL check (git-fixes).\n- usb: dwc3: meson-g12a: add IRQ check (git-fixes).\n- usb: dwc3: meson-g12a: check return of dwc3_meson_g12a_usb_init (git-fixes).\n- usb: dwc3: of-simple: add a shutdown (git-fixes).\n- usb: dwc3: st: Add of_dev_put() in probe function (git-fixes).\n- usb: dwc3: st: Add of_node_put() before return in probe function (git-fixes).\n- usb: dwc3: support continuous runtime PM with dual role (git-fixes).\n- usb: ehci-orion: Handle errors of clk_prepare_enable() in probe (git-fixes).\n- usb: gadget: Export recommended BESL values (git-fixes).\n- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers (git-fixes).\n- usb: gadget: f_hid: fixed NULL pointer dereference (git-fixes).\n- usb: gadget: f_hid: idle uses the highest byte for duration (git-fixes).\n- usb: gadget: mv_u3d: request_irq() after initializing UDC (git-fixes).\n- usb: gadget: udc: at91: add IRQ check (git-fixes).\n- usb: gadget: udc: renesas_usb3: Fix soc_device_match() abuse (git-fixes).\n- usb: host: ohci-tmio: add IRQ check (git-fixes).\n- usb: host: xhci-rcar: Do not reload firmware after the completion (git-fixes).\n- usb: mtu3: fix the wrong HS mult value (git-fixes).\n- usb: mtu3: use @mult for HS isoc or intr (git-fixes).\n- usb: phy: fsl-usb: add IRQ check (git-fixes).\n- usb: phy: tahvo: add IRQ check (git-fixes).\n- usb: phy: twl6030: add IRQ checks (git-fixes).\n- virt_wifi: fix error on connect (git-fixes).\n- virtio_pci: Support surprise removal of virtio pci device (git-fixes).\n- wireguard: allowedips: allocate nodes in kmem_cache (git-fixes).\n- wireguard: allowedips: free empty intermediate nodes when removing single node (git-fixes).\n- wireguard: allowedips: remove nodes in O(1) (git-fixes).\n- writeback: fix obtain a reference to a freeing memcg css (bsc#1189577).\n- x86/fpu: Limit xstate copy size in xstateregs_set() (bsc#1152489).\n- x86/fpu: Make init_fpstate correct with optimized XSAVE (bsc#1152489).\n- x86/fpu: Reset state for all signal restore failures (bsc#1152489).\n- x86/kvm: fix vcpu-id indexed array sizes (git-fixes).\n- x86/signal: Detect and prevent an alternate signal stack overflow (bsc#1152489).\n- xen/events: Fix race in set_evtchn_to_irq (git-fixes).\n- xprtrdma: Pad optimization, revisited (bsc#1189760).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2021-3178,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3178",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3178-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2021:3178-1",
        "url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213178-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2021:3178-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-September/009473.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1040364",
        "url": "https://bugzilla.suse.com/1040364"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127650",
        "url": "https://bugzilla.suse.com/1127650"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1135481",
        "url": "https://bugzilla.suse.com/1135481"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152489",
        "url": "https://bugzilla.suse.com/1152489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160010",
        "url": "https://bugzilla.suse.com/1160010"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1168202",
        "url": "https://bugzilla.suse.com/1168202"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1174969",
        "url": "https://bugzilla.suse.com/1174969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175052",
        "url": "https://bugzilla.suse.com/1175052"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175543",
        "url": "https://bugzilla.suse.com/1175543"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177399",
        "url": "https://bugzilla.suse.com/1177399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180141",
        "url": "https://bugzilla.suse.com/1180141"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180347",
        "url": "https://bugzilla.suse.com/1180347"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181148",
        "url": "https://bugzilla.suse.com/1181148"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181972",
        "url": "https://bugzilla.suse.com/1181972"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184180",
        "url": "https://bugzilla.suse.com/1184180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186264",
        "url": "https://bugzilla.suse.com/1186264"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186731",
        "url": "https://bugzilla.suse.com/1186731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187211",
        "url": "https://bugzilla.suse.com/1187211"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187455",
        "url": "https://bugzilla.suse.com/1187455"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187468",
        "url": "https://bugzilla.suse.com/1187468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187619",
        "url": "https://bugzilla.suse.com/1187619"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188067",
        "url": "https://bugzilla.suse.com/1188067"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188172",
        "url": "https://bugzilla.suse.com/1188172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188418",
        "url": "https://bugzilla.suse.com/1188418"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188439",
        "url": "https://bugzilla.suse.com/1188439"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188616",
        "url": "https://bugzilla.suse.com/1188616"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188780",
        "url": "https://bugzilla.suse.com/1188780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188781",
        "url": "https://bugzilla.suse.com/1188781"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188782",
        "url": "https://bugzilla.suse.com/1188782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188783",
        "url": "https://bugzilla.suse.com/1188783"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188784",
        "url": "https://bugzilla.suse.com/1188784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188786",
        "url": "https://bugzilla.suse.com/1188786"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188787",
        "url": "https://bugzilla.suse.com/1188787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188788",
        "url": "https://bugzilla.suse.com/1188788"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188790",
        "url": "https://bugzilla.suse.com/1188790"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188878",
        "url": "https://bugzilla.suse.com/1188878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188885",
        "url": "https://bugzilla.suse.com/1188885"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188924",
        "url": "https://bugzilla.suse.com/1188924"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188982",
        "url": "https://bugzilla.suse.com/1188982"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188983",
        "url": "https://bugzilla.suse.com/1188983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188985",
        "url": "https://bugzilla.suse.com/1188985"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189021",
        "url": "https://bugzilla.suse.com/1189021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189057",
        "url": "https://bugzilla.suse.com/1189057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189077",
        "url": "https://bugzilla.suse.com/1189077"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189153",
        "url": "https://bugzilla.suse.com/1189153"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189197",
        "url": "https://bugzilla.suse.com/1189197"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189209",
        "url": "https://bugzilla.suse.com/1189209"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189210",
        "url": "https://bugzilla.suse.com/1189210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189212",
        "url": "https://bugzilla.suse.com/1189212"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189213",
        "url": "https://bugzilla.suse.com/1189213"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189214",
        "url": "https://bugzilla.suse.com/1189214"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189215",
        "url": "https://bugzilla.suse.com/1189215"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189216",
        "url": "https://bugzilla.suse.com/1189216"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189217",
        "url": "https://bugzilla.suse.com/1189217"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189218",
        "url": "https://bugzilla.suse.com/1189218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189219",
        "url": "https://bugzilla.suse.com/1189219"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189220",
        "url": "https://bugzilla.suse.com/1189220"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189221",
        "url": "https://bugzilla.suse.com/1189221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189222",
        "url": "https://bugzilla.suse.com/1189222"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189229",
        "url": "https://bugzilla.suse.com/1189229"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189262",
        "url": "https://bugzilla.suse.com/1189262"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189278",
        "url": "https://bugzilla.suse.com/1189278"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189291",
        "url": "https://bugzilla.suse.com/1189291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189292",
        "url": "https://bugzilla.suse.com/1189292"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189298",
        "url": "https://bugzilla.suse.com/1189298"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189301",
        "url": "https://bugzilla.suse.com/1189301"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189305",
        "url": "https://bugzilla.suse.com/1189305"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189323",
        "url": "https://bugzilla.suse.com/1189323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189384",
        "url": "https://bugzilla.suse.com/1189384"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189385",
        "url": "https://bugzilla.suse.com/1189385"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189392",
        "url": "https://bugzilla.suse.com/1189392"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189399",
        "url": "https://bugzilla.suse.com/1189399"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189400",
        "url": "https://bugzilla.suse.com/1189400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189427",
        "url": "https://bugzilla.suse.com/1189427"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189503",
        "url": "https://bugzilla.suse.com/1189503"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189504",
        "url": "https://bugzilla.suse.com/1189504"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189505",
        "url": "https://bugzilla.suse.com/1189505"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189506",
        "url": "https://bugzilla.suse.com/1189506"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189507",
        "url": "https://bugzilla.suse.com/1189507"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189562",
        "url": "https://bugzilla.suse.com/1189562"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189563",
        "url": "https://bugzilla.suse.com/1189563"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189564",
        "url": "https://bugzilla.suse.com/1189564"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189565",
        "url": "https://bugzilla.suse.com/1189565"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189566",
        "url": "https://bugzilla.suse.com/1189566"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189567",
        "url": "https://bugzilla.suse.com/1189567"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189568",
        "url": "https://bugzilla.suse.com/1189568"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189569",
        "url": "https://bugzilla.suse.com/1189569"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189573",
        "url": "https://bugzilla.suse.com/1189573"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189574",
        "url": "https://bugzilla.suse.com/1189574"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189575",
        "url": "https://bugzilla.suse.com/1189575"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189576",
        "url": "https://bugzilla.suse.com/1189576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189577",
        "url": "https://bugzilla.suse.com/1189577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189579",
        "url": "https://bugzilla.suse.com/1189579"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189581",
        "url": "https://bugzilla.suse.com/1189581"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189582",
        "url": "https://bugzilla.suse.com/1189582"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189583",
        "url": "https://bugzilla.suse.com/1189583"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189585",
        "url": "https://bugzilla.suse.com/1189585"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189586",
        "url": "https://bugzilla.suse.com/1189586"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189587",
        "url": "https://bugzilla.suse.com/1189587"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189706",
        "url": "https://bugzilla.suse.com/1189706"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189760",
        "url": "https://bugzilla.suse.com/1189760"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189832",
        "url": "https://bugzilla.suse.com/1189832"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189841",
        "url": "https://bugzilla.suse.com/1189841"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189870",
        "url": "https://bugzilla.suse.com/1189870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189883",
        "url": "https://bugzilla.suse.com/1189883"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190025",
        "url": "https://bugzilla.suse.com/1190025"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190115",
        "url": "https://bugzilla.suse.com/1190115"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190117",
        "url": "https://bugzilla.suse.com/1190117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190131",
        "url": "https://bugzilla.suse.com/1190131"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190181",
        "url": "https://bugzilla.suse.com/1190181"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-34556 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-34556/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-35477 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-35477/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3640 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3653 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3653/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3656 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3656/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3679 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3679/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3732 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3732/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3739 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3739/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3743 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3743/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3753 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-3759 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-3759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38160 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38198 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38198/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38204 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38205 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38205/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-38207 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-38207/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2021-09-21T14:28:38Z",
      "generator": {
        "date": "2021-09-21T14:28:38Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2021:3178-1",
      "initial_release_date": "2021-09-21T14:28:38Z",
      "revision_history": [
        {
          "date": "2021-09-21T14:28:38Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.3.18-18.66.1.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.3.18-18.66.1.noarch",
                  "product_id": "kernel-devel-azure-5.3.18-18.66.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.3.18-18.66.1.noarch",
                "product": {
                  "name": "kernel-source-azure-5.3.18-18.66.1.noarch",
                  "product_id": "kernel-source-azure-5.3.18-18.66.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.3.18-18.66.2.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.3.18-18.66.2.x86_64",
                  "product_id": "dlm-kmp-azure-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.3.18-18.66.2.x86_64",
                  "product_id": "gfs2-kmp-azure-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "kernel-azure-5.3.18-18.66.2.x86_64",
                  "product_id": "kernel-azure-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.3.18-18.66.2.x86_64",
                  "product_id": "kernel-azure-devel-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.3.18-18.66.2.x86_64",
                  "product_id": "kernel-azure-extra-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.3.18-18.66.2.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.3.18-18.66.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.3.18-18.66.1.x86_64",
                  "product_id": "kernel-syms-azure-5.3.18-18.66.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.3.18-18.66.2.x86_64",
                  "product_id": "kselftests-kmp-azure-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.3.18-18.66.2.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.3.18-18.66.2.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.3.18-18.66.2.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.3.18-18.66.2.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.3.18-18.66.2.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
                  "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-18.66.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-18.66.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-18.66.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-18.66.2.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-18.66.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-18.66.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-18.66.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-18.66.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-18.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
          "product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-18.66.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-34556",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-34556"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-34556",
          "url": "https://www.suse.com/security/cve/CVE-2021-34556"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188983 for CVE-2021-34556",
          "url": "https://bugzilla.suse.com/1188983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-34556"
    },
    {
      "cve": "CVE-2021-35477",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-35477"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-35477",
          "url": "https://www.suse.com/security/cve/CVE-2021-35477"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188985 for CVE-2021-35477",
          "url": "https://bugzilla.suse.com/1188985"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-35477"
    },
    {
      "cve": "CVE-2021-3640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3640",
          "url": "https://www.suse.com/security/cve/CVE-2021-3640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188172 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188172"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1188613 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1188613"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1191530 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1191530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196810 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196810"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3640",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3640"
    },
    {
      "cve": "CVE-2021-3653",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3653"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3653",
          "url": "https://www.suse.com/security/cve/CVE-2021-3653"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189399 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189399"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189420 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1189420"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-3653",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3653"
    },
    {
      "cve": "CVE-2021-3656",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3656"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"virt_ext\" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3656",
          "url": "https://www.suse.com/security/cve/CVE-2021-3656"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189400 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189400"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189418 for CVE-2021-3656",
          "url": "https://bugzilla.suse.com/1189418"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-3656"
    },
    {
      "cve": "CVE-2021-3679",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3679"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3679",
          "url": "https://www.suse.com/security/cve/CVE-2021-3679"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189057 for CVE-2021-3679",
          "url": "https://bugzilla.suse.com/1189057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3679"
    },
    {
      "cve": "CVE-2021-3732",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3732"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3732",
          "url": "https://www.suse.com/security/cve/CVE-2021-3732"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189706 for CVE-2021-3732",
          "url": "https://bugzilla.suse.com/1189706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3732"
    },
    {
      "cve": "CVE-2021-3739",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3739"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A NULL pointer dereference flaw was found in the btrfs_rm_device function in fs/btrfs/volumes.c in the Linux Kernel, where triggering the bug requires \u0027CAP_SYS_ADMIN\u0027. This flaw allows a local attacker to crash the system or leak kernel internal information. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3739",
          "url": "https://www.suse.com/security/cve/CVE-2021-3739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189832 for CVE-2021-3739",
          "url": "https://bugzilla.suse.com/1189832"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3739"
    },
    {
      "cve": "CVE-2021-3743",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3743"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3743",
          "url": "https://www.suse.com/security/cve/CVE-2021-3743"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189883 for CVE-2021-3743",
          "url": "https://bugzilla.suse.com/1189883"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3743"
    },
    {
      "cve": "CVE-2021-3753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3753",
          "url": "https://www.suse.com/security/cve/CVE-2021-3753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190025 for CVE-2021-3753",
          "url": "https://bugzilla.suse.com/1190025"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-3753"
    },
    {
      "cve": "CVE-2021-3759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-3759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory overflow vulnerability was found in the Linux kernel\u0027s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-3759",
          "url": "https://www.suse.com/security/cve/CVE-2021-3759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190115 for CVE-2021-3759",
          "url": "https://bugzilla.suse.com/1190115"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-3759"
    },
    {
      "cve": "CVE-2021-38160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38160",
          "url": "https://www.suse.com/security/cve/CVE-2021-38160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190117 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190117"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1190118 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1190118"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38160",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38160"
    },
    {
      "cve": "CVE-2021-38198",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38198"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38198",
          "url": "https://www.suse.com/security/cve/CVE-2021-38198"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189262 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189278 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1189278"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196914 for CVE-2021-38198",
          "url": "https://bugzilla.suse.com/1196914"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-38198"
    },
    {
      "cve": "CVE-2021-38204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38204",
          "url": "https://www.suse.com/security/cve/CVE-2021-38204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189291 for CVE-2021-38204",
          "url": "https://bugzilla.suse.com/1189291"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38204"
    },
    {
      "cve": "CVE-2021-38205",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38205"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/ethernet/xilinx/xilinx_emaclite.c in the Linux kernel before 5.13.3 makes it easier for attackers to defeat an ASLR protection mechanism because it prints a kernel pointer (i.e., the real IOMEM pointer).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38205",
          "url": "https://www.suse.com/security/cve/CVE-2021-38205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189292 for CVE-2021-38205",
          "url": "https://bugzilla.suse.com/1189292"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-38205"
    },
    {
      "cve": "CVE-2021-38207",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-38207"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "drivers/net/ethernet/xilinx/ll_temac_main.c in the Linux kernel before 5.12.13 allows remote attackers to cause a denial of service (buffer overflow and lockup) by sending heavy network traffic for about ten minutes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
          "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-38207",
          "url": "https://www.suse.com/security/cve/CVE-2021-38207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1189298 for CVE-2021-38207",
          "url": "https://bugzilla.suse.com/1189298"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.66.2.x86_64",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.66.1.noarch",
            "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.66.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2021-09-21T14:28:38Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-38207"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.